Advances in Intelligent Data Analysis and Applications : Proceeding of the Sixth Euro-China Conference on Intelligent Data Analysis and Applications, 15-18 October 2019, Arad, Romania |
Autore | Pan Jeng-Shyang |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2022 |
Descrizione fisica | 1 online resource (379 pages) |
Altri autori (Persone) |
BalasValentina Emilia
ChenChien-Ming |
Collana | Smart Innovation, Systems and Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811650369
9789811650352 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Keynotes -- Contents -- About the Editors -- 1 Analysis of Power Grid Security Access Protection Based on Internet Technology -- Abstract -- 1 Introduction -- 2 Risk Analysis -- 3 Security -- 3.1 Border Security -- 3.2 Host Security -- 3.2.1 User Security Policy -- 3.2.2 Risk Assessment -- 3.2.3 Access Control -- 3.2.4 Third-Party Component Security -- 3.2.5 Host Virus Protection -- 3.2.6 Security Audit -- 3.2.7 Resource Control -- 3.3 Cyber Security -- 3.3.1 APN Line -- 3.3.2 Wired Private Network Plus 4G-LTE Network -- 3.4 Terminal Security -- 3.4.1 Terminal Equipment Security Hardening -- 3.4.2 Identification -- 3.4.3 Secure Access -- 3.4.4 Safety Supervision -- 4 Conclusion -- Acknowledgements -- References -- 2 Design of UHV Transmission Line Selection Line -- Abstract -- 1 Introduction -- 2 UHV Line Selection Model and Objective Function Establishment -- 3 Optimization of Line Selection Design Mode -- 4 Analysis of Experimental Results -- 5 Conclusion -- Acknowledgements -- References -- 3 Experimental Investigation on Warm Incremental Sheet Forming Assisted with Oil Bath Heating -- Abstract -- 1 Introduction -- 2 Experimental Principles -- 3 Experimental Set-Up and Procedure -- 4 Experimental Plan and Results -- 5 The Analysis of Variance (ANOVA) of Experimental Results -- 6 Response Surface Results and Interaction Effects -- 7 Conclusion -- Acknowledgements -- References -- 4 The Effect of Process Parameters on the Springback of AZ31B Mg Alloy in Warm Incremental Sheet Forming Assisted with Oil Bath Heating -- Abstract -- 1 Introduction -- 2 Springback Analyses and Measurement -- 3 Experimental Set-Up and Procedure -- 4 Experimental Plan and Results -- 5 The Statistical Analysis and Model Fitting -- 6 The Effect of One Factor Involved Multiple Interactions -- 7 Conclusion -- Acknowledgements -- References.
5 Distributed Finite-Time Consistent Tracking Control for Multi-agent Systems Based on the Fixed Directed Topology -- Abstract -- 1 Introduction -- 2 Model Description -- 3 Main Results -- 4 Numerical Simulation -- 5 Conclusion -- References -- 6 Inner Mongolia Big Data Industry's Development Status and Its Active Promotion to the Construction of China-Mongolia-Russia Economic Corridor -- Abstract -- 1 Introduction -- 2 Overview of Big Data Industry in Inner Mongolia and Its Promoting Role in the Construction of China-Mongolia-Russia Economic Corridor -- 2.1 Overview of the Development of Big Data Industry in Inner Mongolia -- 2.2 The Promoting Role of Inner Mongolia Big Data Industry in the Construction of China-Mongolia-Russia Economic Corridor -- 3 Inner Mongolia Big Data Industry and Its Path and Countermeasure to Realize the Innovative Driving Role in the Construction of China-Mongolia-Russia Economic Corridor -- 4 Conclusion -- References -- 7 An Improved Median Filter Method Based on Multi-directional Template Combined with Image Feature -- Abstract -- 1 Introduction -- 2 Improved Median Filter Algorithm Based on Multi-directional Templates -- 2.1 Suspicious Noise Pixels Extraction Based on Adaptive Median Filtering -- 2.2 Median Filter Method with Multi-directional Templates -- 3 Experiment and Analysis -- 3.1 Evaluation Index -- 3.2 Analysis of PCB Image Denoising -- 4 Conclusion -- Acknowledgements -- References -- 8 Using Support Vector Machine for Option Trading on Settlement Day -- Abstract -- 1 Introduction -- 2 Background and Preliminaries -- 2.1 Kelly Criterion -- 2.2 Ralph Vince's Optimal Fraction -- 2.3 Support Vector Machine -- 2.4 Price Fluctuation of Options on Settlement Date -- 3 Using Technical Indicators as Feature -- 4 Using Money Management on the Option Settlement Date -- 5 Conclusions -- References. 9 An Evolutionary-Based Game Model of Honest and Dishonest Sellers -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Game Model of Sellers -- 3.1 Model Framework -- 3.2 Theoretical Analysis of the Model -- 4 Experimental -- 4.1 The Influence of Honest Non-monopoly Sellers on the Credit Evolution -- 4.2 The Influence of Honest Monopoly Sellers on the Credit Evolution -- 4.3 The Influence of Award and Punishment on the Credit Evolution -- 5 Conclusion -- Acknowledgements -- References -- 10 A Case Knowledge Extraction Method for Chinese Legal Texts -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Domain Based Named Entity Recognition -- 2.2 Research on Knowledge Extraction of Legal Texts -- 3 Case Knowledge Extraction Model -- 3.1 Entity Labeling -- 3.2 Knowledge Extraction on Legal Document -- 3.3 Case Fact Extraction Based on Dependency Syntax -- 4 Experiment and Results -- 4.1 Data Acquisition and Preprocessing -- 4.2 Results on Named Entity Recognition -- 4.3 Performance on Knowledge Extraction -- 4.4 Case Fact Extraction Result Based on Dependency Syntax -- 5 Conclusion -- References -- 11 Hand Detection Based on YOLOv3 -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Hand Detection Model -- 3.1 YOLOv3 -- 3.2 Darknet-53 -- 3.3 Dataset -- 3.4 Experiments -- 4 Conclusion -- References -- 12 Lung Detection Based on YOLOv3 -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lung Detection Model -- 3.1 YOLOv3 -- 3.2 Darknet-53 -- 3.3 Dataset -- 3.4 Experiments -- 4 Conclusion -- References -- 13 A Fuzzy Creative Works Generation Algorithm Based on Graph Neural Network -- Abstract -- 1 Introduction -- 2 The Fuzzy Creative Works Generation Algorithm Based on GNN -- 2.1 Construction of Multi-Label Fuzzy Creative Data Set -- 2.2 Calculation of Fuzzy Logic Relationships Between Creative Entities -- 2.3 Generation of Fuzzy Creative Works. 3 Evaluation of the Fuzzy Creative Works Generation Results -- 3.1 Realization of Creative Generating Environment -- 3.2 The Comparison Between the Fuzzy Creative Works Generation Algorithm Based on GNN and Manual Selection -- 4 Conclusion -- Acknowledgement -- References -- 14 A Sensitivity Analysis Method of Soil Erosion Based on Land Use Type -- Abstract -- 1 Introduction -- 2 Data Source and Processing -- 2.1 Data Source -- 2.2 Data Preprocessing -- 2.3 Generation of Soil Erosion Sensitivity Distribution Map -- 3 Sensitivity Analysis of Soil Erosion -- 3.1 Relationship Between Soil Erosion and Land Use -- 3.2 Comprehensive Evaluation of Soil Erosion Sensitivity -- 4 Summary -- Acknowledgements -- References -- 15 Land Use Classification Based on Maximum Likelihood Method -- Abstract -- 1 Introduction -- 2 Data Source and Processing -- 2.1 Research Area Survey -- 2.2 Data Source -- 2.3 Data Processing -- 3 Analysis of Land Used Status -- 3.1 Land Used Classification Map -- 3.2 Distribution of Different Land Use Types -- 4 Summary -- Acknowledgements -- References -- 16 Spatial Distribution of Heavy Metals in Soil Based on Kriging Interpolation -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Introduction to Research Areas -- 2.2 Sample Collection and Processing -- 2.3 Data Processing and Analysis -- 3 Result Analysis -- 3.1 Description of Spatial Variation Structure -- 3.2 Kriging Interpolation of Heavy Metals in Soil -- 4 Summary -- Acknowledgements -- References -- 17 Temporal and Spatial Changes of Forest Leaf Area Index Based on MODIS: A Case Study of Fujian Province -- Abstract -- 1 Introduction -- 2 Data Source and Data Processing -- 2.1 Data Source -- 2.2 Data Processing -- 3 Experimental Analysis and Conclusions -- 3.1 Analysis of LAI Spatial Change -- 3.2 Time Variation Analysis of LAI -- 4 Summary -- Acknowledgements. References -- 18 A Meteorological Public Opinion Method Research Base on Deep Random Forest -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Public Opinion Analysis Method -- 3.1 Public Opinion Analysis Framework -- 3.2 Feature Extraction by Vectorization -- 3.3 Build Classifiers -- 3.4 Deep Random Forest -- 4 Experiment and Results -- 4.1 Corpus -- 4.2 Data Preprocessing -- 4.3 Design -- 4.4 Analysis of Experimental Results -- 5 Conclusion -- References -- 19 A New Approach of Intrusion Detection with Command Sequence-To-Sequence Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 User Command Sequence-To-Sequence Model -- 3.1 Overview of Our Approach -- 3.2 Prediction Model -- 4 Experiment and Evaluation -- 4.1 Dataset -- 4.2 Result Analysis -- 5 Conclusion -- References -- 20 A Survey of Anomaly Traffic Detection Based on Machine Learning -- Abstract -- 1 Introduction -- 2 Machine Learning Methods in Anomaly Traffic -- 2.1 Hierarchical Clustering -- 2.2 Enhanced SVM -- 2.3 Machine Learning Based on SDN -- 2.4 LSTM Model -- 3 Conclusion and Future Work -- References -- 21 Application of Fuzzy Neural Network in Chromatographic Separation -- Abstract -- 1 Introduction -- 2 Mathematical Model of Chromatographic Separation -- 3 Simulation and Prediction -- 3.1 Experimental Environment -- 3.2 FNN Training -- 4 Conclusion -- Acknowledgements -- References -- 22 Concentration Control of SMB System Based on Hierarchical Fuzzy Controller -- Abstract -- 1 Introduction -- 2 Related Model and Method -- 2.1 TMB and SMB Equation Model -- 2.2 Using Forward Difference Method to Numerate Partial Differential Equations -- 3 Simulation -- 3.1 Experimental Environment and Data -- 3.2 Sensitivity Analysis of the Parameters -- 4 Hierarchical Fuzzy Controls -- 4.1 Fuzzy Rule and Controller Structure -- 4.2 Concentration Control Result -- 5 Conclusion. Acknowledgements. |
Record Nr. | UNINA-9910510561903321 |
Pan Jeng-Shyang | ||
Singapore : , : Springer Singapore Pte. Limited, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Intelligent Information Hiding and Multimedia Signal Processing : Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 2 / / edited by Jeng-Shyang Pan, Zhenyu Meng, Jianpo Li, Maria Virvou |
Autore | Pan Jeng-Shyang |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (355 pages) |
Disciplina | 005.8 |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Multimedia systems Data protection Computational Intelligence Artificial Intelligence Multimedia Information Systems Data and Information Security |
ISBN | 981-19-1053-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Speech Manipulation Detection Method Using Speech Fingerprints and Timestamp Data -- Chapter 2. A PHR sharing model based on Tangle and PRE -- Chapter 3. A Novel Motor Task Classification Scheme in Magnetoencephalography based on CNN -- Chapter 4. Cooperative Search of UAV Formation Guided by Probability Graph -- Chapter 5. Design of encryption system based on state machine optimization scheme and FPGA implementation -- Chapter 6. Unscented Kalman Filter for UAV Real-time Localizating Dynamic Target on the Ground -- Chapter 7. A Novel Fish Migration Optimization with QUasi-A ne TRansformation Evolutionary for Numerical Optimization and Application -- Chapter 8. Face Virtual Sample Generation with 3D Model Based on Generative Adversarial Networks -- Chapter 9. Deep Learning-based Helmet Wearing Detection for Safety Surveillance -- Chapter 10. Pattern Matching Method for Q&A Information Retrieval System -- Chapter 11. Research on Evaluation Method of Network Vulnera-bility in Power Monitoring System -- Chapter 12. The Clustering Algorithm Based on Improved Antlion Optimization Algorithm with K-means Concepts -- Chapter 13. Reversible data hiding based on multiple strategies -- Chapter 14. A Fully Restored Quantum Progressive Visual Secret Sharing Scheme -- Chapter 15. Construction of Interface Evaluation System in Internet-connected Vehicle Oriented to Automation Trust Calibration. etc. |
Record Nr. | UNINA-9910584486003321 |
Pan Jeng-Shyang | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence |
Autore | Pan Jeng-Shyang |
Pubbl/distr/stampa | Singapore, : World Scientific Publishing Company, 2004 |
Descrizione fisica | 1 online resource (852 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
HuangHsiang-Cheh
JainL. C |
Collana | Series on innovative intelligence |
Soggetto topico |
Digital watermarking
Cryptography Computer security Data protection |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-34766-3
9786611347666 981-256-252-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intelligent Watermarking Techniques; Preface; CONTENTS; Part I. Fundamentals of Watermarking and Intelligent Techniques; Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan; 1 Introduction; 2 Some Terminology; 3 Applications; 4 Requirements; 1. Robustness; 2. Transparency; 3. Tamper resistance; 4. Information capacity; 5. Complexity; 5 Classifications; 5.1 Perceptible and Imperceptible Watermarks; 5.2 Robust, Fragile, and Semi-Fragile Watermarks; 5.2.1 Robust watermarks; 5.2.2 Fragile watermarks; 5.2.3 Semi-fragile watermarks
5.3 Algorithm Design Issues6 Watermark Embedding Schemes; 6.1 Spatial Domain Watermarking; 6.2 Transform Domain Watermarking; 6.3 QIM Watermarking; 7 Watermark Extraction Categories; 7.1 Extraction with/without The Original Multimedia Contents; 7.2 The Public/Secret Keys; 8 Attacking Schemes; 8.1 Image Compression; 8.1.1 VQ compression; 8.1.2 JPEG compression; 8.2 Image Cropping; 8.3 Spatial Filtering; 8.4 Image Rotation; 8.5 Image Shifting and Line Deletion; 9 Watermarking Benchmarks; 9.1 Stirmark; 9.2 Checkmark; 9.3 Opitmark; 9.4 CERTIMARK; 10 Activities with Watermarking Research 10.1 Internet Resources10.2 Special Issues in International Journals; 10.3 Books; 10.4 Related Sessions in International Conferences; 10.5 Companies and Products Relating to Watermarking; 11 Organization of This Book; 12 Summary; References; Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi; 1 Introduction; 2 A Neuro-Fuzzy Learning Algorithm; 3 Extraction of Typical Data from Training Data Based on FCM; 4 Numerical Examples; 5 Conclusions; References; Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu; 1 Evolutionary Computation 2 Genetic Algorithms2.1 Selection Methods; 2.2 Creating Offspring; 3 Other Evolution Algorithms; 3.1 Evolution Strategies and Evolutionary Programming; 3.2 Genetic Programming; 4 Parallelizing Simulated Evolution; 4.1 Coarse-Grain Models; 4.2 Fine-Grain Models; 5 Summary; References; Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick; 1 Introduction; 2 Genetic Algorithms; 3 Ant Systems; 4 Particle Swarm Optimization; 5 Discussions and Conclusions; References; Part II. Watermarking Techniques Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang1 Introduction; 2 General Embedding Structures in The Spatial Domain; 3 General Extraction Structures in The Spatial Domain; 4 Issues for Practical Implementations; 4.1 Bit Plane Manipulations of The LSB's; 4.2 Selecting The Embedding Positions; 5 Applications; 5.1 Video Watermarking Applications; 5.2 Frame Reordering and Dropping; 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains; 6 Conclusions; References Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang |
Record Nr. | UNINA-9910450159203321 |
Pan Jeng-Shyang | ||
Singapore, : World Scientific Publishing Company, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Watermarking Techniques [[electronic resource] ] : Series On Innovative Intelligence |
Autore | Pan Jeng-Shyang |
Pubbl/distr/stampa | Singapore, : World Scientific Publishing Company, 2004 |
Descrizione fisica | 1 online resource (852 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
HuangHsiang-Cheh
JainL. C |
Collana | Series on innovative intelligence |
Soggetto topico |
Digital watermarking
Cryptography Computer security Data protection |
ISBN |
1-281-34766-3
9786611347666 981-256-252-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intelligent Watermarking Techniques; Preface; CONTENTS; Part I. Fundamentals of Watermarking and Intelligent Techniques; Chapter 1. An Introduction to Watermarking Techniques Hsiang-Cheh Huang, Hsueh-Ming Hang, and Jeng-Shyang Pan; 1 Introduction; 2 Some Terminology; 3 Applications; 4 Requirements; 1. Robustness; 2. Transparency; 3. Tamper resistance; 4. Information capacity; 5. Complexity; 5 Classifications; 5.1 Perceptible and Imperceptible Watermarks; 5.2 Robust, Fragile, and Semi-Fragile Watermarks; 5.2.1 Robust watermarks; 5.2.2 Fragile watermarks; 5.2.3 Semi-fragile watermarks
5.3 Algorithm Design Issues6 Watermark Embedding Schemes; 6.1 Spatial Domain Watermarking; 6.2 Transform Domain Watermarking; 6.3 QIM Watermarking; 7 Watermark Extraction Categories; 7.1 Extraction with/without The Original Multimedia Contents; 7.2 The Public/Secret Keys; 8 Attacking Schemes; 8.1 Image Compression; 8.1.1 VQ compression; 8.1.2 JPEG compression; 8.2 Image Cropping; 8.3 Spatial Filtering; 8.4 Image Rotation; 8.5 Image Shifting and Line Deletion; 9 Watermarking Benchmarks; 9.1 Stirmark; 9.2 Checkmark; 9.3 Opitmark; 9.4 CERTIMARK; 10 Activities with Watermarking Research 10.1 Internet Resources10.2 Special Issues in International Journals; 10.3 Books; 10.4 Related Sessions in International Conferences; 10.5 Companies and Products Relating to Watermarking; 11 Organization of This Book; 12 Summary; References; Chapter 2. Neuro-Fuzzy Learning Theory Yan Shi, Masaharu Mizumoto, and Peng Shi; 1 Introduction; 2 A Neuro-Fuzzy Learning Algorithm; 3 Extraction of Typical Data from Training Data Based on FCM; 4 Numerical Examples; 5 Conclusions; References; Chapter 3. Evolutionary Algorithms Wei-Po Lee and Chao-Hsing Hsu; 1 Evolutionary Computation 2 Genetic Algorithms2.1 Selection Methods; 2.2 Creating Offspring; 3 Other Evolution Algorithms; 3.1 Evolution Strategies and Evolutionary Programming; 3.2 Genetic Programming; 4 Parallelizing Simulated Evolution; 4.1 Coarse-Grain Models; 4.2 Fine-Grain Models; 5 Summary; References; Chapter 4. A Tutorial on Meta-Heuristics for Optimization Shu-Chuan Chu, Chin-Shiuh Shieh, and John F. Roddick; 1 Introduction; 2 Genetic Algorithms; 3 Ant Systems; 4 Particle Swarm Optimization; 5 Discussions and Conclusions; References; Part II. Watermarking Techniques Chapter 5. Watermarking Based on Spatial Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang1 Introduction; 2 General Embedding Structures in The Spatial Domain; 3 General Extraction Structures in The Spatial Domain; 4 Issues for Practical Implementations; 4.1 Bit Plane Manipulations of The LSB's; 4.2 Selecting The Embedding Positions; 5 Applications; 5.1 Video Watermarking Applications; 5.2 Frame Reordering and Dropping; 5.3 Combining Spatial-Domain Watermarking with Watermarking in Different Domains; 6 Conclusions; References Chapter 6. Watermarking Based on Transform Domain Hsiang-Cheh Huang, Jeng-Shyang Pan, and Hsueh-Ming Hang |
Record Nr. | UNINA-9910783223203321 |
Pan Jeng-Shyang | ||
Singapore, : World Scientific Publishing Company, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|