LEADER 11018nam 2200493 450 001 9910488716903321 005 20220330091051.0 010 $a3-030-78618-8 035 $a(CKB)5590000000517970 035 $a(MiAaPQ)EBC6676389 035 $a(Au-PeEL)EBL6676389 035 $a(OCoLC)1259515607 035 $a(PPN)258060565 035 $a(EXLCZ)995590000000517970 100 $a20220330d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAdvances in artificial intelligence and security. Part II$hPart II $e7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings /$fXingming Sun [and three others], editors 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (760 pages) 225 1 $aCommunications in computer and information science ;$v1423 311 $a3-030-78617-X 327 $aIntro -- Preface -- Organization -- Contents - Part II -- Artificial Intelligence -- An Approach Based on Demand Prediction with LSTM for Solving Multi-batch 2D Cutting Stock Problems -- 1 Introduction -- 2 Description of 2CSV Problem -- 2.1 Mathematical Model of Two-Dimensional Rectangular Cutting Stock Problem (2D-CSP) -- 2.2 Long Short-Term Memory (LSTM) Neural Networks -- 3 Two-Dimensional Rectangular Cutting Stock Problem Based on LSTM Prediction Demand (LSTM-2DCSP) -- 4 Experimental Results and Analysis -- 4.1 Experimental Condition -- 4.2 Experimental Data -- 4.3 Experimental Process and Result Analysis -- 5 Conclusion -- References -- The Identification of Slope Crack Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Research -- 3 Fracture Identification Network Model -- 3.1 Network Framework -- 3.2 Training Methods -- 3.3 The Evaluation Index -- 4 Experimental Results and Analysis -- 4.1 Data Set -- 4.2 Experimental Configuration and Model Training -- 4.3 Experimental Results and Analysis -- 5 Conclusion -- References -- Multi-dimensional Fatigue Driving Detection Method Based on SVM Improved by the Kernel Function -- 1 Introduction -- 2 Fatigue Driving Detection Method Based on Improved Kernel Function Support Vector Machine -- 2.1 Multi-dimensional Fatigue Driving Feature Extraction Based on Gradient Descent Cascade Regression Model -- 2.2 Improved Logical Kernel Function -- 3 Experiment and Result Analysis -- 3.1 Experimental Background -- 3.2 Experimental Process -- 4 Conclusion and Future Directions -- References -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- 1 Introduction -- 2 Related Work -- 2.1 COVID-Net for COVID-19 Identification -- 2.2 Federated Learning -- 3 Federated learning System for COVID-19 CXR Images -- 3.1 Basic Definition -- 3.2 Framework of the Federated Learning System. 327 $a4 Experiments -- 4.1 Dataset -- 4.2 Experimental Setting -- 4.3 Implementation and Training -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- A Novel Network Covert Channel Model Based on Blockchain Transaction Parity -- 1 Introduction -- 2 Related Works -- 2.1 Covert Channel -- 2.2 Blockchain -- 3 The Proposed Scheme -- 3.1 Framework -- 3.2 Parity Definition -- 3.3 Information Transmission -- 4 Performance Evaluation -- 5 Conclusion -- References -- An Improved CNN Model for Fast Salient Object Detection -- 1 Introduction -- 2 Related Work -- 2.1 Pyramid Pooling Module -- 2.2 PoolNet -- 2.3 Fire Module -- 2.4 AdaX -- 3 Optimizer -- 3.1 Optimizer Introduction -- 3.2 Compression Model -- 3.3 The Introduction of AdaX Optimizer for Adam Optimizer -- 4 Experimental Results -- 4.1 Loss Functions and Datasets -- 4.2 Evaluation Criteria -- 5 Conclusion -- References -- Control System Design of Transport Robot Based on Multi-color Recognition -- 1 Research Status -- 2 Handling Robot Design Requirements and Overall Design Plan -- 3 Tracking Module Software Design -- 4 Color Recognition Module -- 4.1 Working Mode and Working Principle of Color Sensor -- 4.2 Color Sensor Working Mode Software Configuration -- 4.3 Software Algorithm of Color Sensor -- 5 Research and Experiment of Robot Handling Planning Strategy -- 6 In Conclusion -- References -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- 1 Introduction -- 2 Background and Motivation -- 2.1 Cache Based Load Balancing -- 2.2 Cache Systems with Variable Object Sizes -- 2.3 Motivation -- 3 SACache System Design -- 3.1 SACache Architecture -- 3.2 Implementation -- 3.3 Request Path -- 3.4 Use Cases -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Result -- 5 Related Work -- 6 Conclusion -- Appendix A -- Appendix B -- References. 327 $aHeterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- 1 Introduction -- 2 Virtualization and Migration -- 2.1 Simulation -- 2.2 Virtual Machine -- 2.3 Containers -- 2.4 A Comparative Study -- 3 Typical Works -- 3.1 Interpreted Language Applications -- 3.2 Compiled Language Applications -- 3.3 Hybrid Applications -- 4 Purpose of Migration -- 4.1 Following User Mobility -- 4.2 Performance -- 4.3 Energy Efficiency -- 5 Discussions -- 5.1 Comparative Study -- 5.2 Scenarios and Selection -- 5.3 Open Research Issues -- 6 Conclusion -- References -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- 1 Introduction -- 2 Model -- 3 Machine Learning Algorithms Classify the Environments(s) -- 4 Results -- 4.1 Classification of s -- 4.2 Regression of s -- 5 Conclusion -- References -- Big Data -- W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors -- 1 Introduction -- 2 The Design of the Group Detection Algorithm Based on Comprehensive Vector -- 2.1 Comprehensive Similarity Calculation Based on Comprehensive Vector Model -- 2.2 Design of W-Louvain Algorithm -- 3 Experiment -- 3.1 Datasets -- 3.2 Experiment Process -- 4 Conclusion -- References -- Application of Non-negative Matrix Factorization in Fault Detection of Distribution Network -- 1 Introduction -- 2 Introduction to NMF Related Algorithms -- 2.1 NMF Basic Algorithm -- 2.2 Projection Non-negative Matrix Factorization Algorithm -- 3 GPNMF Algorithm -- 4 Fault Detection Method Based on GPNMF -- 4.1 Monitoring Model Construction -- 5 Fault Detection Method Based on GPNMF -- 6 Simulation Verification -- 7 Conclusion -- References -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- 1 Introduction -- 2 Related Work -- 2.1 Main Path Analysis -- 2.2 PageRank. 327 $a3 Datasets -- 3.1 Datasets -- 3.2 Improved Method -- 3.3 Evaluation -- 4 Experiment Result -- 4.1 K-core Graph -- 4.2 Average Cited Frequency and Coverage -- 4.3 Discussion Main Paths and Related Domains -- 5 Conclusion -- References -- On-Chain and Off-Chain Collaborative Management System Based on Consortium Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Hyperledger Fabric -- 2.2 Transaction Process -- 3 Requirements Analysis -- 3.1 Application Scenario -- 3.2 Functional Module -- 4 Design and Implementation -- 4.1 Architecture Design -- 4.2 Smart Contract Design -- 5 Evaluation -- 5.1 Environment Configuration -- 5.2 Operating Environment -- 5.3 System Functions -- 5.4 System Performance -- 6 Conclusion -- References -- The Implementation of Aeronautical Information Exchange Model in SWIM -- 1 Introduction -- 2 Aeronautical Information Exchange Model -- 2.1 AIXM Overview -- 2.2 AIXM Composition -- 2.3 Time Slice Model -- 3 Method of Establishing AIXM -- 3.1 AIXM Modeling Process -- 3.2 AIXM UML Class Diagram Example (Airport/Heliport Class Diagram) -- 4 Modeling Process Realization -- 4.1 Process of Model Building Method -- 4.2 Source Data Processing -- 4.3 Model Test Results -- 5 Conclusion -- References -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- 1 Introduction -- 2 Related Work -- 3 Cascade Classifier Text Localization Algorithm -- 3.1 Cascade Classification Algorithm Based on Real AdaBoost -- 3.2 Perceptual-Based Text Grouping Algorithm -- 4 Experimental Results and Analysis -- 4.1 Experiments and Results of the First Level Classifier -- 4.2 Experiments and Results of the Second Level Classifier -- 4.3 Comparative Experiment and Analysis -- 5 Conclusion -- References -- Research on the Application of Big Data Analysis in University Library -- 1 First Section -- 2 Related Works. 327 $a3 Big Data Analysis Method -- 3.1 Correlation Analysis -- 3.2 Cluster Analysis -- 3.3 Recommendation Algorithm Based on Matrix Factorization -- 4 Application of Big Data Analysis in University Library -- 4.1 Data Collection -- 4.2 Data Processing and Analysis -- 4.3 Forecast of Data Processing and Analysis Results -- 4.4 Experimental Verification of Big Data Analysis -- 5 In Conclusion -- 5.1 Personalized Recommendation -- 5.2 Personalized Search -- 5.3 Decision Support -- References -- Research on Support Vector Machine in Traffic Detection Algorithm -- 1 Introduction -- 2 Related Works -- 3 First Section -- 3.1 Description of Classification Problem -- 3.2 Linear Separable Support Vector Machine -- 3.3 Linear Inseparable Support Vector Machine -- 4 Design of Event Detection Algorithm Based on SVM -- 4.1 The Principle and Design Process of SVM-AID Algorithm -- 4.2 Traffic Parameter Selection -- 4.3 Choice of Model and Kernel Function -- 4.4 Algorithm Simulation and Result Analysis -- 5 Summary -- References -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- 1 Introduction -- 2 Experimental Part -- 2.1 Experimental Materials -- 2.2 Instruments and Equipment -- 2.3 Experimental Pretreatment -- 2.4 Preparation of Buffer Material -- 2.5 Experimental Design of Different Fillers -- 3 Determination of Foam Properties -- 3.1 Determination of Buffer Coefficient -- 3.2 Determination of Resilience -- 3.3 Density Measurement -- 4 Results and Discussion -- 4.1 Properties of Foams with Different Fillers -- 4.2 Cushioning Properties of Foams with Different Fillers -- 4.3 Morphology of Foams with Different Fillers -- 4.4 Infrared Spectrum Analysis of Hemp Stalk Core/Corn Stalk Foam -- 4.5 DSC Analysis of Hemp Stalk Core/Corn Straw Foam -- 5 Conclusion -- References. 327 $aResearch on Data Analysis to Improve English Vocabulary Learning Performance. 410 0$aCommunications in computer and information science ;$v1423. 606 $aArtificial intelligence$vCongresses 615 0$aArtificial intelligence 676 $a006.3 702 $aSun$b Xingming 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910488716903321 996 $aAdvances in artificial intelligence and security. Part II$92814854 997 $aUNINA