top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Intelligent Data Analysis and Applications : Proceeding of the Sixth Euro-China Conference on Intelligent Data Analysis and Applications, 15-18 October 2019, Arad, Romania
Advances in Intelligent Data Analysis and Applications : Proceeding of the Sixth Euro-China Conference on Intelligent Data Analysis and Applications, 15-18 October 2019, Arad, Romania
Autore Pan Jeng-Shyang
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2022
Descrizione fisica 1 online resource (379 pages)
Altri autori (Persone) BalasValentina Emilia
ChenChien-Ming
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 9789811650369
9789811650352
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Keynotes -- Contents -- About the Editors -- 1 Analysis of Power Grid Security Access Protection Based on Internet Technology -- Abstract -- 1 Introduction -- 2 Risk Analysis -- 3 Security -- 3.1 Border Security -- 3.2 Host Security -- 3.2.1 User Security Policy -- 3.2.2 Risk Assessment -- 3.2.3 Access Control -- 3.2.4 Third-Party Component Security -- 3.2.5 Host Virus Protection -- 3.2.6 Security Audit -- 3.2.7 Resource Control -- 3.3 Cyber Security -- 3.3.1 APN Line -- 3.3.2 Wired Private Network Plus 4G-LTE Network -- 3.4 Terminal Security -- 3.4.1 Terminal Equipment Security Hardening -- 3.4.2 Identification -- 3.4.3 Secure Access -- 3.4.4 Safety Supervision -- 4 Conclusion -- Acknowledgements -- References -- 2 Design of UHV Transmission Line Selection Line -- Abstract -- 1 Introduction -- 2 UHV Line Selection Model and Objective Function Establishment -- 3 Optimization of Line Selection Design Mode -- 4 Analysis of Experimental Results -- 5 Conclusion -- Acknowledgements -- References -- 3 Experimental Investigation on Warm Incremental Sheet Forming Assisted with Oil Bath Heating -- Abstract -- 1 Introduction -- 2 Experimental Principles -- 3 Experimental Set-Up and Procedure -- 4 Experimental Plan and Results -- 5 The Analysis of Variance (ANOVA) of Experimental Results -- 6 Response Surface Results and Interaction Effects -- 7 Conclusion -- Acknowledgements -- References -- 4 The Effect of Process Parameters on the Springback of AZ31B Mg Alloy in Warm Incremental Sheet Forming Assisted with Oil Bath Heating -- Abstract -- 1 Introduction -- 2 Springback Analyses and Measurement -- 3 Experimental Set-Up and Procedure -- 4 Experimental Plan and Results -- 5 The Statistical Analysis and Model Fitting -- 6 The Effect of One Factor Involved Multiple Interactions -- 7 Conclusion -- Acknowledgements -- References.
5 Distributed Finite-Time Consistent Tracking Control for Multi-agent Systems Based on the Fixed Directed Topology -- Abstract -- 1 Introduction -- 2 Model Description -- 3 Main Results -- 4 Numerical Simulation -- 5 Conclusion -- References -- 6 Inner Mongolia Big Data Industry's Development Status and Its Active Promotion to the Construction of China-Mongolia-Russia Economic Corridor -- Abstract -- 1 Introduction -- 2 Overview of Big Data Industry in Inner Mongolia and Its Promoting Role in the Construction of China-Mongolia-Russia Economic Corridor -- 2.1 Overview of the Development of Big Data Industry in Inner Mongolia -- 2.2 The Promoting Role of Inner Mongolia Big Data Industry in the Construction of China-Mongolia-Russia Economic Corridor -- 3 Inner Mongolia Big Data Industry and Its Path and Countermeasure to Realize the Innovative Driving Role in the Construction of China-Mongolia-Russia Economic Corridor -- 4 Conclusion -- References -- 7 An Improved Median Filter Method Based on Multi-directional Template Combined with Image Feature -- Abstract -- 1 Introduction -- 2 Improved Median Filter Algorithm Based on Multi-directional Templates -- 2.1 Suspicious Noise Pixels Extraction Based on Adaptive Median Filtering -- 2.2 Median Filter Method with Multi-directional Templates -- 3 Experiment and Analysis -- 3.1 Evaluation Index -- 3.2 Analysis of PCB Image Denoising -- 4 Conclusion -- Acknowledgements -- References -- 8 Using Support Vector Machine for Option Trading on Settlement Day -- Abstract -- 1 Introduction -- 2 Background and Preliminaries -- 2.1 Kelly Criterion -- 2.2 Ralph Vince's Optimal Fraction -- 2.3 Support Vector Machine -- 2.4 Price Fluctuation of Options on Settlement Date -- 3 Using Technical Indicators as Feature -- 4 Using Money Management on the Option Settlement Date -- 5 Conclusions -- References.
9 An Evolutionary-Based Game Model of Honest and Dishonest Sellers -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Game Model of Sellers -- 3.1 Model Framework -- 3.2 Theoretical Analysis of the Model -- 4 Experimental -- 4.1 The Influence of Honest Non-monopoly Sellers on the Credit Evolution -- 4.2 The Influence of Honest Monopoly Sellers on the Credit Evolution -- 4.3 The Influence of Award and Punishment on the Credit Evolution -- 5 Conclusion -- Acknowledgements -- References -- 10 A Case Knowledge Extraction Method for Chinese Legal Texts -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Domain Based Named Entity Recognition -- 2.2 Research on Knowledge Extraction of Legal Texts -- 3 Case Knowledge Extraction Model -- 3.1 Entity Labeling -- 3.2 Knowledge Extraction on Legal Document -- 3.3 Case Fact Extraction Based on Dependency Syntax -- 4 Experiment and Results -- 4.1 Data Acquisition and Preprocessing -- 4.2 Results on Named Entity Recognition -- 4.3 Performance on Knowledge Extraction -- 4.4 Case Fact Extraction Result Based on Dependency Syntax -- 5 Conclusion -- References -- 11 Hand Detection Based on YOLOv3 -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Hand Detection Model -- 3.1 YOLOv3 -- 3.2 Darknet-53 -- 3.3 Dataset -- 3.4 Experiments -- 4 Conclusion -- References -- 12 Lung Detection Based on YOLOv3 -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lung Detection Model -- 3.1 YOLOv3 -- 3.2 Darknet-53 -- 3.3 Dataset -- 3.4 Experiments -- 4 Conclusion -- References -- 13 A Fuzzy Creative Works Generation Algorithm Based on Graph Neural Network -- Abstract -- 1 Introduction -- 2 The Fuzzy Creative Works Generation Algorithm Based on GNN -- 2.1 Construction of Multi-Label Fuzzy Creative Data Set -- 2.2 Calculation of Fuzzy Logic Relationships Between Creative Entities -- 2.3 Generation of Fuzzy Creative Works.
3 Evaluation of the Fuzzy Creative Works Generation Results -- 3.1 Realization of Creative Generating Environment -- 3.2 The Comparison Between the Fuzzy Creative Works Generation Algorithm Based on GNN and Manual Selection -- 4 Conclusion -- Acknowledgement -- References -- 14 A Sensitivity Analysis Method of Soil Erosion Based on Land Use Type -- Abstract -- 1 Introduction -- 2 Data Source and Processing -- 2.1 Data Source -- 2.2 Data Preprocessing -- 2.3 Generation of Soil Erosion Sensitivity Distribution Map -- 3 Sensitivity Analysis of Soil Erosion -- 3.1 Relationship Between Soil Erosion and Land Use -- 3.2 Comprehensive Evaluation of Soil Erosion Sensitivity -- 4 Summary -- Acknowledgements -- References -- 15 Land Use Classification Based on Maximum Likelihood Method -- Abstract -- 1 Introduction -- 2 Data Source and Processing -- 2.1 Research Area Survey -- 2.2 Data Source -- 2.3 Data Processing -- 3 Analysis of Land Used Status -- 3.1 Land Used Classification Map -- 3.2 Distribution of Different Land Use Types -- 4 Summary -- Acknowledgements -- References -- 16 Spatial Distribution of Heavy Metals in Soil Based on Kriging Interpolation -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Introduction to Research Areas -- 2.2 Sample Collection and Processing -- 2.3 Data Processing and Analysis -- 3 Result Analysis -- 3.1 Description of Spatial Variation Structure -- 3.2 Kriging Interpolation of Heavy Metals in Soil -- 4 Summary -- Acknowledgements -- References -- 17 Temporal and Spatial Changes of Forest Leaf Area Index Based on MODIS: A Case Study of Fujian Province -- Abstract -- 1 Introduction -- 2 Data Source and Data Processing -- 2.1 Data Source -- 2.2 Data Processing -- 3 Experimental Analysis and Conclusions -- 3.1 Analysis of LAI Spatial Change -- 3.2 Time Variation Analysis of LAI -- 4 Summary -- Acknowledgements.
References -- 18 A Meteorological Public Opinion Method Research Base on Deep Random Forest -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Public Opinion Analysis Method -- 3.1 Public Opinion Analysis Framework -- 3.2 Feature Extraction by Vectorization -- 3.3 Build Classifiers -- 3.4 Deep Random Forest -- 4 Experiment and Results -- 4.1 Corpus -- 4.2 Data Preprocessing -- 4.3 Design -- 4.4 Analysis of Experimental Results -- 5 Conclusion -- References -- 19 A New Approach of Intrusion Detection with Command Sequence-To-Sequence Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 User Command Sequence-To-Sequence Model -- 3.1 Overview of Our Approach -- 3.2 Prediction Model -- 4 Experiment and Evaluation -- 4.1 Dataset -- 4.2 Result Analysis -- 5 Conclusion -- References -- 20 A Survey of Anomaly Traffic Detection Based on Machine Learning -- Abstract -- 1 Introduction -- 2 Machine Learning Methods in Anomaly Traffic -- 2.1 Hierarchical Clustering -- 2.2 Enhanced SVM -- 2.3 Machine Learning Based on SDN -- 2.4 LSTM Model -- 3 Conclusion and Future Work -- References -- 21 Application of Fuzzy Neural Network in Chromatographic Separation -- Abstract -- 1 Introduction -- 2 Mathematical Model of Chromatographic Separation -- 3 Simulation and Prediction -- 3.1 Experimental Environment -- 3.2 FNN Training -- 4 Conclusion -- Acknowledgements -- References -- 22 Concentration Control of SMB System Based on Hierarchical Fuzzy Controller -- Abstract -- 1 Introduction -- 2 Related Model and Method -- 2.1 TMB and SMB Equation Model -- 2.2 Using Forward Difference Method to Numerate Partial Differential Equations -- 3 Simulation -- 3.1 Experimental Environment and Data -- 3.2 Sensitivity Analysis of the Parameters -- 4 Hierarchical Fuzzy Controls -- 4.1 Fuzzy Rule and Controller Structure -- 4.2 Concentration Control Result -- 5 Conclusion.
Acknowledgements.
Record Nr. UNINA-9910510561903321
Pan Jeng-Shyang  
Singapore : , : Springer Singapore Pte. Limited, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 / / edited by Jeng-Shyang Pan, Zhenyu Meng, Jianpo Li, Maria Virvou
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 / / edited by Jeng-Shyang Pan, Zhenyu Meng, Jianpo Li, Maria Virvou
Autore Pan Jeng-Shyang
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (355 pages)
Disciplina 005.8
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Multimedia systems
Data protection
Computational Intelligence
Artificial Intelligence
Multimedia Information Systems
Data and Information Security
ISBN 981-19-1053-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Speech Manipulation Detection Method Using Speech Fingerprints and Timestamp Data -- Chapter 2. A PHR sharing model based on Tangle and PRE -- Chapter 3. A Novel Motor Task Classification Scheme in Magnetoencephalography based on CNN -- Chapter 4. Cooperative Search of UAV Formation Guided by Probability Graph -- Chapter 5. Design of encryption system based on state machine optimization scheme and FPGA implementation -- Chapter 6. Unscented Kalman Filter for UAV Real-time Localizating Dynamic Target on the Ground -- Chapter 7. A Novel Fish Migration Optimization with QUasi-A ne TRansformation Evolutionary for Numerical Optimization and Application -- Chapter 8. Face Virtual Sample Generation with 3D Model Based on Generative Adversarial Networks -- Chapter 9. Deep Learning-based Helmet Wearing Detection for Safety Surveillance -- Chapter 10. Pattern Matching Method for Q&A Information Retrieval System -- Chapter 11. Research on Evaluation Method of Network Vulnera-bility in Power Monitoring System -- Chapter 12. The Clustering Algorithm Based on Improved Antlion Optimization Algorithm with K-means Concepts -- Chapter 13. Reversible data hiding based on multiple strategies -- Chapter 14. A Fully Restored Quantum Progressive Visual Secret Sharing Scheme -- Chapter 15. Construction of Interface Evaluation System in Internet-connected Vehicle Oriented to Automation Trust Calibration. etc.
Record Nr. UNINA-9910584486003321
Pan Jeng-Shyang  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence
Autore Pan Jeng-Shyang
Pubbl/distr/stampa Singapore, : World Scientific Publishing Company, 2004
Descrizione fisica 1 online resource (852 p.)
Disciplina 005.8/2
Altri autori (Persone) HuangHsiang-Cheh
JainL. C
Collana Series on innovative intelligence
Soggetto topico Digital watermarking
Cryptography
Computer security
Data protection
Soggetto genere / forma Electronic books.
ISBN 1-281-34766-3
9786611347666
981-256-252-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent Watermarking Techniques; Preface; CONTENTS; Part I. Fundamentals of Watermarking and Intelligent Techniques; Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan; 1 Introduction; 2 Some Terminology; 3 Applications; 4 Requirements; 1. Robustness; 2. Transparency; 3. Tamper resistance; 4. Information capacity; 5. Complexity; 5 Classifications; 5.1 Perceptible and Imperceptible Watermarks; 5.2 Robust, Fragile, and Semi-Fragile Watermarks; 5.2.1 Robust watermarks; 5.2.2 Fragile watermarks; 5.2.3 Semi-fragile watermarks
5.3 Algorithm Design Issues6 Watermark Embedding Schemes; 6.1 Spatial Domain Watermarking; 6.2 Transform Domain Watermarking; 6.3 QIM Watermarking; 7 Watermark Extraction Categories; 7.1 Extraction with/without The Original Multimedia Contents; 7.2 The Public/Secret Keys; 8 Attacking Schemes; 8.1 Image Compression; 8.1.1 VQ compression; 8.1.2 JPEG compression; 8.2 Image Cropping; 8.3 Spatial Filtering; 8.4 Image Rotation; 8.5 Image Shifting and Line Deletion; 9 Watermarking Benchmarks; 9.1 Stirmark; 9.2 Checkmark; 9.3 Opitmark; 9.4 CERTIMARK; 10 Activities with Watermarking Research
10.1 Internet Resources10.2 Special Issues in International Journals; 10.3 Books; 10.4 Related Sessions in International Conferences; 10.5 Companies and Products Relating to Watermarking; 11 Organization of This Book; 12 Summary; References; Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi; 1 Introduction; 2 A Neuro-Fuzzy Learning Algorithm; 3 Extraction of Typical Data from Training Data Based on FCM; 4 Numerical Examples; 5 Conclusions; References; Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu; 1 Evolutionary Computation
2 Genetic Algorithms2.1 Selection Methods; 2.2 Creating Offspring; 3 Other Evolution Algorithms; 3.1 Evolution Strategies and Evolutionary Programming; 3.2 Genetic Programming; 4 Parallelizing Simulated Evolution; 4.1 Coarse-Grain Models; 4.2 Fine-Grain Models; 5 Summary; References; Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick; 1 Introduction; 2 Genetic Algorithms; 3 Ant Systems; 4 Particle Swarm Optimization; 5 Discussions and Conclusions; References; Part II. Watermarking Techniques
Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang1 Introduction; 2 General Embedding Structures in The Spatial Domain; 3 General Extraction Structures in The Spatial Domain; 4 Issues for Practical Implementations; 4.1 Bit Plane Manipulations of The LSB's; 4.2 Selecting The Embedding Positions; 5 Applications; 5.1 Video Watermarking Applications; 5.2 Frame Reordering and Dropping; 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains; 6 Conclusions; References
Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang
Record Nr. UNINA-9910450159203321
Pan Jeng-Shyang  
Singapore, : World Scientific Publishing Company, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence
Autore Pan Jeng-Shyang
Pubbl/distr/stampa Singapore, : World Scientific Publishing Company, 2004
Descrizione fisica 1 online resource (852 p.)
Disciplina 005.8/2
Altri autori (Persone) HuangHsiang-Cheh
JainL. C
Collana Series on innovative intelligence
Soggetto topico Digital watermarking
Cryptography
Computer security
Data protection
ISBN 1-281-34766-3
9786611347666
981-256-252-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent Watermarking Techniques; Preface; CONTENTS; Part I. Fundamentals of Watermarking and Intelligent Techniques; Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan; 1 Introduction; 2 Some Terminology; 3 Applications; 4 Requirements; 1. Robustness; 2. Transparency; 3. Tamper resistance; 4. Information capacity; 5. Complexity; 5 Classifications; 5.1 Perceptible and Imperceptible Watermarks; 5.2 Robust, Fragile, and Semi-Fragile Watermarks; 5.2.1 Robust watermarks; 5.2.2 Fragile watermarks; 5.2.3 Semi-fragile watermarks
5.3 Algorithm Design Issues6 Watermark Embedding Schemes; 6.1 Spatial Domain Watermarking; 6.2 Transform Domain Watermarking; 6.3 QIM Watermarking; 7 Watermark Extraction Categories; 7.1 Extraction with/without The Original Multimedia Contents; 7.2 The Public/Secret Keys; 8 Attacking Schemes; 8.1 Image Compression; 8.1.1 VQ compression; 8.1.2 JPEG compression; 8.2 Image Cropping; 8.3 Spatial Filtering; 8.4 Image Rotation; 8.5 Image Shifting and Line Deletion; 9 Watermarking Benchmarks; 9.1 Stirmark; 9.2 Checkmark; 9.3 Opitmark; 9.4 CERTIMARK; 10 Activities with Watermarking Research
10.1 Internet Resources10.2 Special Issues in International Journals; 10.3 Books; 10.4 Related Sessions in International Conferences; 10.5 Companies and Products Relating to Watermarking; 11 Organization of This Book; 12 Summary; References; Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi; 1 Introduction; 2 A Neuro-Fuzzy Learning Algorithm; 3 Extraction of Typical Data from Training Data Based on FCM; 4 Numerical Examples; 5 Conclusions; References; Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu; 1 Evolutionary Computation
2 Genetic Algorithms2.1 Selection Methods; 2.2 Creating Offspring; 3 Other Evolution Algorithms; 3.1 Evolution Strategies and Evolutionary Programming; 3.2 Genetic Programming; 4 Parallelizing Simulated Evolution; 4.1 Coarse-Grain Models; 4.2 Fine-Grain Models; 5 Summary; References; Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick; 1 Introduction; 2 Genetic Algorithms; 3 Ant Systems; 4 Particle Swarm Optimization; 5 Discussions and Conclusions; References; Part II. Watermarking Techniques
Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang1 Introduction; 2 General Embedding Structures in The Spatial Domain; 3 General Extraction Structures in The Spatial Domain; 4 Issues for Practical Implementations; 4.1 Bit Plane Manipulations of The LSB's; 4.2 Selecting The Embedding Positions; 5 Applications; 5.1 Video Watermarking Applications; 5.2 Frame Reordering and Dropping; 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains; 6 Conclusions; References
Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang
Record Nr. UNINA-9910783223203321
Pan Jeng-Shyang  
Singapore, : World Scientific Publishing Company, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui