Vai al contenuto principale della pagina

Computer Science and Education. Computer Science and Technology : 18th International Conference, ICCSE 2023, Sepang, Malaysia, December 1-7, 2023, Proceedings, Part I



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Hong Wenxing Visualizza persona
Titolo: Computer Science and Education. Computer Science and Technology : 18th International Conference, ICCSE 2023, Sepang, Malaysia, December 1-7, 2023, Proceedings, Part I Visualizza cluster
Pubblicazione: Singapore : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (519 pages)
Altri autori: KanaparanGeetha  
Nota di contenuto: Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Contents - Part III -- Computer Science and Data Science -- Optimization of Replica Technology with Two-Stages Dynamic Factor in Cloud Environment -- 1 Introduction -- 2 Hadoop Default Replica Policy -- 2.1 Default Replica Management Mechanism -- 2.2 Main Problems and Analysis -- 3 Dynamic Replica Factor Adjustment Strategy -- 3.1 Basic Idea of Improved Algorithm -- 3.2 Improved Dynamic Replica Factor Adjustment Algorithm -- 4 Simulation Verification and Analysis -- 5 Conclusion -- References -- Study of Encryption Strategy Based on Multi Owner Attribute -- 1 Introduction -- 2 Attribute Encryption Mechanism -- 3 Multi Attribute Encryption Mechanism -- 4 Simulation Experimental and Performance Analysis -- 5 Conclusion -- References -- Web Accessibility Enhancement for Medical Consultation Platforms -- 1 Introduction -- 2 Materials and Methods -- 2.1 Preliminary Study -- 2.2 System Design and Implementation -- 3 User Study and Result -- 3.1 Experiment Design and Study -- 3.2 Result Analysis -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Philosophy and History from a Cross-Cultural Perspective: Learning Based on the Assassin's Creed -- 1 Introduction -- 2 The Historical and Educational Significance of Assassin's Creed -- 2.1 A Realistic Restoration of History -- 2.2 The Abilities it Helps to Cultivate -- 2.3 The Practical Applications and Cases in the Field of Education -- 3 Three Types of Cross-Cultural Activities When Experiencing Assassin's Creed -- 3.1 Experience Role-Playing and Enjoy Vivid History -- 3.2 Experience Diverse Civilizations and Have Better Cognition -- 3.3 Make Historical Comparisons and Have Profound Reflection -- 4 Recommendations for Assassin's Creed -- 5 Conclusion -- References.
Data Transaction Mode and Its Legal Regulation in the Context of Market-Oriented Allocation of Data Elements -- 1 Current Situation and Practical Problems of Data Trading Market -- 2 Trading Mode of Data Factor Market -- 2.1 Type of Existing Data Transaction Mode -- 2.2 A New Type of Data Transaction Mode: Data Division Transaction Mode -- 3 Legal Regulation of Data Factor Transaction -- 3.1 Internal Review of Data Platform -- 3.2 External Specification of Data Platform -- 4 Peroration -- References -- Study on the Fundamentals of Electrical Engineering Based on Grey Correlation Analysis -- 1 Introduction -- 2 Important Courses of Basic Preface of Electrical Engineering -- 3 The Grey Correlation Cluster Analysis Theory -- 4 An Empirical Study of Learning Situation Analysis -- 5 Conclusions -- References -- The Network Planning for LSP Protection in PTN -- 1 Introduction -- 1.1 A Subsection Sample -- 2 The Problem of LSP Protection -- 2.1 False LSP Protection -- 2.2 Valid LSP Protection -- 3 ILP Model for Problem of LSP Protection -- 3.1 Definition of LSP Protection Problem -- 3.2 Notations and Variables -- 3.3 Objective and Constraints of LSP Protection Problem -- 4 Heuristic Algorithm -- 4.1 Most Request Demand Ordering Algorithm -- 5 Performance Evaluation -- 5.1 ILP and Heuristic Algorithms Under a Small Topology -- 5.2 Heuristic Algorithms in a Large Topology -- 6 Conclusion -- References -- The Static Virtual Machine Placement and Routing Spectrum Assignment for Multi-tenant in Elastic Optical Networks -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Virtual Machine Placement and Routing Spectrum Assignment -- 2.1 Traffic Demands Driven by VM Placement -- 2.2 Virtual Machine Placement and Routing Spectrum Assignment -- 3 ILP Model -- 3.1 Notations and Variables -- 3.2 Objective and Constraints of the VMPRSA Problem -- 4 Heuristic Algorithm.
4.1 Two-Tier Algorithm Framework -- 4.2 Random Placement -- 4.3 Residual Node Capacity Priority -- 5 Performance Evaluation -- 5.1 ILP and Heuristic Algorithms Under a Small Topology -- 5.2 Heuristic Algorithms in a Large Topology -- 6 Conclusion -- References -- Machine Learning and Its Applications -- CTAN: Collaborative Tag-Aware Attentive Network for Recommendation -- 1 Introduction -- 2 Related Work -- 2.1 Tag-Aware Recommendation -- 2.2 Graph-Based Representation -- 3 Method -- 3.1 Problem Formulation -- 3.2 Collaborative Tag-Aware Attentive Network for Recommendation -- 4 Experiment Setup -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Implementation Detail -- 5 Result -- 5.1 Performance Evaluation -- 5.2 Ablation Study -- 5.3 Parameter Experiment -- 6 Conclusion and Future Work -- References -- Research of Network Intrusion Detection Based on Improved Seagull Optimization Algorithm with Deep Learning -- 1 Introduction -- 2 Network Intrusion Detection Method Based on Improved Seagull Optimization Algorithm and Gated Recurrent Unit -- 2.1 Improved Seagull Optimization Algorithm -- 2.2 Experiment and Analysis -- 3 Conclusion -- References -- Improved Dragonfly Algorithm Based on Mixed Strategy -- 1 Introduction -- 2 Related Work -- 3 Mixed Strategy Improved Dragonfly Algorithm -- 3.1 Initialization Population Based on Sobol Sequence -- 3.2 Nonlinearly Decreasing Inertia Weights -- 3.3 Random Learning Strategy -- 3.4 Cauchy Mutation Strategy -- 3.5 Algorithm Implementation -- 4 Experiment -- 5 Conclusion -- References -- Deep Learning Based Network Intrusion Detection -- 1 Introduction -- 2 Related Work -- 3 Network Intrusion Detection Method Based on CNN and LSTM -- 4 Experiment and Analysis -- 4.1 Data Sets -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- An Optimization Algorithm Based on Levy's Flight Improvement.
1 Introduction -- 2 Related Works -- 2.1 Levy's Flight Theory -- 2.2 Levy's Flight Mathematical Representation -- 3 Lightning Connection Process Optimization Algorithm Combined with Levy's Flight -- 3.1 Algorithm Design Idea -- 3.2 Algorithm Steps and Flow Chart of Levy-LAPO -- 4 Experiment -- 5 Summary of This Chapter -- References -- Image Classification Based on Improved Unsupervised Clustering Algorithm -- 1 Introduction -- 2 An Unsupervised Classification Model Based on Improved Kmeans Clustering Algorithm -- 2.1 Unsupervised Clustering Algorithm -- 2.2 Canopy Algorithm -- 2.3 Improved K-Means Algorithm Based on Density-Weighted Canopy Algorithm -- 3 Image Classification Combined with Residual Network Resnet Models -- 3.1 Unsupervised Classification Model Design -- 4 Simulation -- 4.1 Experimental Dataset -- 4.2 Evaluation Indicators -- 4.3 Experimental Results and Analysis -- 5 Conclusion -- References -- Partial Attention-Based Direction-Aware Vehicle Re-identification -- 1 Introduction -- 2 Methodology -- 2.1 Network Architecture -- 2.2 Squeeze-and-Excitation Attention Mechanism -- 2.3 Local Co-occurrence Attention Mechanism -- 2.4 Direction Weighted Fusion Strategy -- 3 Experiments -- 3.1 Datasets -- 3.2 Implementation Details -- 3.3 Experiments on VeRi776 Dataset -- 3.4 Experiments on VehicleID Dataset -- 4 Ablation Study -- 4.1 The Effects of Key Components -- 5 Qualitative Analysis -- 6 Conclusion -- References -- A Deep Learning-Based Method for Classroom Crowd Counting and Localization -- 1 Introduction -- 2 Related Work -- 2.1 Detection-Based Methods -- 2.2 Map-Based Methods -- 3 Proposed Method -- 3.1 SENet Module -- 3.2 Feature Fusion Module for Bilateral Three-Path Module -- 3.3 Loss Function -- 4 Experiment -- 4.1 Experimental Environment and Parameter Settings -- 4.2 Experimental Dataset and Preprocessing.
4.3 Experimental Results and Comparison -- 5 Conclusion -- References -- Use of Computer Vision to Authenticate Retail Invoices with the Convolution-Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 The Conclusion and Future Works -- References -- Automated Analysis of Chemistry Experiment Videos: New Challenges for Video Understanding -- 1 Introduction -- 1.1 Declarative Knowledge and Procedural Knowledge -- 1.2 Evaluation of Procedural Knowledge -- 2 Chemistry Experimental Video Dataset -- 3 The Analysis of Chemistry Experimental Videos -- 4 The Results on Temporal Action Segmentation -- 5 Conclusion -- References -- Exploiting Adaptive Adversarial Transfer Network for Cross Domain Teacher's Speech Emotion Recognition -- 1 Introduction -- 2 Method -- 2.1 Problem Definition -- 2.2 Overall Architecture -- 3 Experiments -- 3.1 Datasets -- 3.2 Parameter Configuration and Model Comparison -- 3.3 Results and Analysis -- 4 Conclusions -- References -- Personalized Programming Guidance Based on Deep Programming Learning Style Capturing -- 1 Introduction -- 2 Related Works -- 2.1 Sequential Recommendation -- 2.2 Sequential Recommendation in E-Learning -- 2.3 Learning Style Model -- 3 Preliminaries -- 3.1 Programming Learning Style Model -- 3.2 Problem Definition -- 4 PERS Framework -- 4.1 Representing Module -- 4.2 Differentiating Module -- 4.3 Updating Module -- 4.4 Predicting Module -- 5 Experiments -- 5.1 Experimental Settings -- 5.2 RQ1: Overall Performance -- 5.3 RQ2: Ablation Study -- 5.4 RQ3: Sensitivity Analysis of Hyperparameters -- 5.5 RQ4: Case Study on Visualization Analysis -- 6 Conclusions -- References -- Design Intelligent Manufacturing Teaching Experiments with Machine Learning -- 1 Introduction -- 1.1 Background -- 1.2 Challenge in Teaching Intelligent Manufacturing Practice.
2 Experiment Teaching Platform.
Titolo autorizzato: Computer Science and Education. Computer Science and Technology  Visualizza cluster
ISBN: 981-9707-30-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910841864803321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Communications in Computer and Information Science Series