top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part I / / Xingming Sun [and three others] editors
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part I / / Xingming Sun [and three others] editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (730 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
Computer security
ISBN 3-031-06767-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910584597303321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part I / / Xingming Sun [and three others] editors
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part I / / Xingming Sun [and three others] editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (730 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
Computer security
ISBN 3-031-06767-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996483163703316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security . Part III : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings / / Xingming Sun [and three others], editors
Advances in artificial intelligence and security . Part III : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings / / Xingming Sun [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (751 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
Computer security
Cyberspace - Security measures
ISBN 3-031-06764-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996483164603316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part II / / Xingming Sun [and three others] editors
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part II / / Xingming Sun [and three others] editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (732 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
Computer security
ISBN 3-031-06761-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996483163103316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security . Part III : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings / / Xingming Sun [and three others], editors
Advances in artificial intelligence and security . Part III : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings / / Xingming Sun [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (751 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
Computer security
Cyberspace - Security measures
ISBN 3-031-06764-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910583506303321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part II / / Xingming Sun [and three others] editors
Advances in artificial intelligence and security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings. Part II / / Xingming Sun [and three others] editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (732 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
Computer security
ISBN 3-031-06761-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910584493803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNINA-9910488693903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNISA-996464519403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security. Part II . Part II : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings / / Xingming Sun [and three others], editors
Advances in artificial intelligence and security. Part II . Part II : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings / / Xingming Sun [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
ISBN 3-030-78618-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Artificial Intelligence -- An Approach Based on Demand Prediction with LSTM for Solving Multi-batch 2D Cutting Stock Problems -- 1 Introduction -- 2 Description of 2CSV Problem -- 2.1 Mathematical Model of Two-Dimensional Rectangular Cutting Stock Problem (2D-CSP) -- 2.2 Long Short-Term Memory (LSTM) Neural Networks -- 3 Two-Dimensional Rectangular Cutting Stock Problem Based on LSTM Prediction Demand (LSTM-2DCSP) -- 4 Experimental Results and Analysis -- 4.1 Experimental Condition -- 4.2 Experimental Data -- 4.3 Experimental Process and Result Analysis -- 5 Conclusion -- References -- The Identification of Slope Crack Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Research -- 3 Fracture Identification Network Model -- 3.1 Network Framework -- 3.2 Training Methods -- 3.3 The Evaluation Index -- 4 Experimental Results and Analysis -- 4.1 Data Set -- 4.2 Experimental Configuration and Model Training -- 4.3 Experimental Results and Analysis -- 5 Conclusion -- References -- Multi-dimensional Fatigue Driving Detection Method Based on SVM Improved by the Kernel Function -- 1 Introduction -- 2 Fatigue Driving Detection Method Based on Improved Kernel Function Support Vector Machine -- 2.1 Multi-dimensional Fatigue Driving Feature Extraction Based on Gradient Descent Cascade Regression Model -- 2.2 Improved Logical Kernel Function -- 3 Experiment and Result Analysis -- 3.1 Experimental Background -- 3.2 Experimental Process -- 4 Conclusion and Future Directions -- References -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- 1 Introduction -- 2 Related Work -- 2.1 COVID-Net for COVID-19 Identification -- 2.2 Federated Learning -- 3 Federated learning System for COVID-19 CXR Images -- 3.1 Basic Definition -- 3.2 Framework of the Federated Learning System.
4 Experiments -- 4.1 Dataset -- 4.2 Experimental Setting -- 4.3 Implementation and Training -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- A Novel Network Covert Channel Model Based on Blockchain Transaction Parity -- 1 Introduction -- 2 Related Works -- 2.1 Covert Channel -- 2.2 Blockchain -- 3 The Proposed Scheme -- 3.1 Framework -- 3.2 Parity Definition -- 3.3 Information Transmission -- 4 Performance Evaluation -- 5 Conclusion -- References -- An Improved CNN Model for Fast Salient Object Detection -- 1 Introduction -- 2 Related Work -- 2.1 Pyramid Pooling Module -- 2.2 PoolNet -- 2.3 Fire Module -- 2.4 AdaX -- 3 Optimizer -- 3.1 Optimizer Introduction -- 3.2 Compression Model -- 3.3 The Introduction of AdaX Optimizer for Adam Optimizer -- 4 Experimental Results -- 4.1 Loss Functions and Datasets -- 4.2 Evaluation Criteria -- 5 Conclusion -- References -- Control System Design of Transport Robot Based on Multi-color Recognition -- 1 Research Status -- 2 Handling Robot Design Requirements and Overall Design Plan -- 3 Tracking Module Software Design -- 4 Color Recognition Module -- 4.1 Working Mode and Working Principle of Color Sensor -- 4.2 Color Sensor Working Mode Software Configuration -- 4.3 Software Algorithm of Color Sensor -- 5 Research and Experiment of Robot Handling Planning Strategy -- 6 In Conclusion -- References -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- 1 Introduction -- 2 Background and Motivation -- 2.1 Cache Based Load Balancing -- 2.2 Cache Systems with Variable Object Sizes -- 2.3 Motivation -- 3 SACache System Design -- 3.1 SACache Architecture -- 3.2 Implementation -- 3.3 Request Path -- 3.4 Use Cases -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Result -- 5 Related Work -- 6 Conclusion -- Appendix A -- Appendix B -- References.
Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- 1 Introduction -- 2 Virtualization and Migration -- 2.1 Simulation -- 2.2 Virtual Machine -- 2.3 Containers -- 2.4 A Comparative Study -- 3 Typical Works -- 3.1 Interpreted Language Applications -- 3.2 Compiled Language Applications -- 3.3 Hybrid Applications -- 4 Purpose of Migration -- 4.1 Following User Mobility -- 4.2 Performance -- 4.3 Energy Efficiency -- 5 Discussions -- 5.1 Comparative Study -- 5.2 Scenarios and Selection -- 5.3 Open Research Issues -- 6 Conclusion -- References -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- 1 Introduction -- 2 Model -- 3 Machine Learning Algorithms Classify the Environments(s) -- 4 Results -- 4.1 Classification of s -- 4.2 Regression of s -- 5 Conclusion -- References -- Big Data -- W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors -- 1 Introduction -- 2 The Design of the Group Detection Algorithm Based on Comprehensive Vector -- 2.1 Comprehensive Similarity Calculation Based on Comprehensive Vector Model -- 2.2 Design of W-Louvain Algorithm -- 3 Experiment -- 3.1 Datasets -- 3.2 Experiment Process -- 4 Conclusion -- References -- Application of Non-negative Matrix Factorization in Fault Detection of Distribution Network -- 1 Introduction -- 2 Introduction to NMF Related Algorithms -- 2.1 NMF Basic Algorithm -- 2.2 Projection Non-negative Matrix Factorization Algorithm -- 3 GPNMF Algorithm -- 4 Fault Detection Method Based on GPNMF -- 4.1 Monitoring Model Construction -- 5 Fault Detection Method Based on GPNMF -- 6 Simulation Verification -- 7 Conclusion -- References -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- 1 Introduction -- 2 Related Work -- 2.1 Main Path Analysis -- 2.2 PageRank.
3 Datasets -- 3.1 Datasets -- 3.2 Improved Method -- 3.3 Evaluation -- 4 Experiment Result -- 4.1 K-core Graph -- 4.2 Average Cited Frequency and Coverage -- 4.3 Discussion Main Paths and Related Domains -- 5 Conclusion -- References -- On-Chain and Off-Chain Collaborative Management System Based on Consortium Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Hyperledger Fabric -- 2.2 Transaction Process -- 3 Requirements Analysis -- 3.1 Application Scenario -- 3.2 Functional Module -- 4 Design and Implementation -- 4.1 Architecture Design -- 4.2 Smart Contract Design -- 5 Evaluation -- 5.1 Environment Configuration -- 5.2 Operating Environment -- 5.3 System Functions -- 5.4 System Performance -- 6 Conclusion -- References -- The Implementation of Aeronautical Information Exchange Model in SWIM -- 1 Introduction -- 2 Aeronautical Information Exchange Model -- 2.1 AIXM Overview -- 2.2 AIXM Composition -- 2.3 Time Slice Model -- 3 Method of Establishing AIXM -- 3.1 AIXM Modeling Process -- 3.2 AIXM UML Class Diagram Example (Airport/Heliport Class Diagram) -- 4 Modeling Process Realization -- 4.1 Process of Model Building Method -- 4.2 Source Data Processing -- 4.3 Model Test Results -- 5 Conclusion -- References -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- 1 Introduction -- 2 Related Work -- 3 Cascade Classifier Text Localization Algorithm -- 3.1 Cascade Classification Algorithm Based on Real AdaBoost -- 3.2 Perceptual-Based Text Grouping Algorithm -- 4 Experimental Results and Analysis -- 4.1 Experiments and Results of the First Level Classifier -- 4.2 Experiments and Results of the Second Level Classifier -- 4.3 Comparative Experiment and Analysis -- 5 Conclusion -- References -- Research on the Application of Big Data Analysis in University Library -- 1 First Section -- 2 Related Works.
3 Big Data Analysis Method -- 3.1 Correlation Analysis -- 3.2 Cluster Analysis -- 3.3 Recommendation Algorithm Based on Matrix Factorization -- 4 Application of Big Data Analysis in University Library -- 4.1 Data Collection -- 4.2 Data Processing and Analysis -- 4.3 Forecast of Data Processing and Analysis Results -- 4.4 Experimental Verification of Big Data Analysis -- 5 In Conclusion -- 5.1 Personalized Recommendation -- 5.2 Personalized Search -- 5.3 Decision Support -- References -- Research on Support Vector Machine in Traffic Detection Algorithm -- 1 Introduction -- 2 Related Works -- 3 First Section -- 3.1 Description of Classification Problem -- 3.2 Linear Separable Support Vector Machine -- 3.3 Linear Inseparable Support Vector Machine -- 4 Design of Event Detection Algorithm Based on SVM -- 4.1 The Principle and Design Process of SVM-AID Algorithm -- 4.2 Traffic Parameter Selection -- 4.3 Choice of Model and Kernel Function -- 4.4 Algorithm Simulation and Result Analysis -- 5 Summary -- References -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- 1 Introduction -- 2 Experimental Part -- 2.1 Experimental Materials -- 2.2 Instruments and Equipment -- 2.3 Experimental Pretreatment -- 2.4 Preparation of Buffer Material -- 2.5 Experimental Design of Different Fillers -- 3 Determination of Foam Properties -- 3.1 Determination of Buffer Coefficient -- 3.2 Determination of Resilience -- 3.3 Density Measurement -- 4 Results and Discussion -- 4.1 Properties of Foams with Different Fillers -- 4.2 Cushioning Properties of Foams with Different Fillers -- 4.3 Morphology of Foams with Different Fillers -- 4.4 Infrared Spectrum Analysis of Hemp Stalk Core/Corn Stalk Foam -- 4.5 DSC Analysis of Hemp Stalk Core/Corn Straw Foam -- 5 Conclusion -- References.
Research on Data Analysis to Improve English Vocabulary Learning Performance.
Record Nr. UNINA-9910488716903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence and security. Part II . Part II : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings / / Xingming Sun [and three others], editors
Advances in artificial intelligence and security. Part II . Part II : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings / / Xingming Sun [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Artificial intelligence
ISBN 3-030-78618-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Artificial Intelligence -- An Approach Based on Demand Prediction with LSTM for Solving Multi-batch 2D Cutting Stock Problems -- 1 Introduction -- 2 Description of 2CSV Problem -- 2.1 Mathematical Model of Two-Dimensional Rectangular Cutting Stock Problem (2D-CSP) -- 2.2 Long Short-Term Memory (LSTM) Neural Networks -- 3 Two-Dimensional Rectangular Cutting Stock Problem Based on LSTM Prediction Demand (LSTM-2DCSP) -- 4 Experimental Results and Analysis -- 4.1 Experimental Condition -- 4.2 Experimental Data -- 4.3 Experimental Process and Result Analysis -- 5 Conclusion -- References -- The Identification of Slope Crack Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Research -- 3 Fracture Identification Network Model -- 3.1 Network Framework -- 3.2 Training Methods -- 3.3 The Evaluation Index -- 4 Experimental Results and Analysis -- 4.1 Data Set -- 4.2 Experimental Configuration and Model Training -- 4.3 Experimental Results and Analysis -- 5 Conclusion -- References -- Multi-dimensional Fatigue Driving Detection Method Based on SVM Improved by the Kernel Function -- 1 Introduction -- 2 Fatigue Driving Detection Method Based on Improved Kernel Function Support Vector Machine -- 2.1 Multi-dimensional Fatigue Driving Feature Extraction Based on Gradient Descent Cascade Regression Model -- 2.2 Improved Logical Kernel Function -- 3 Experiment and Result Analysis -- 3.1 Experimental Background -- 3.2 Experimental Process -- 4 Conclusion and Future Directions -- References -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- 1 Introduction -- 2 Related Work -- 2.1 COVID-Net for COVID-19 Identification -- 2.2 Federated Learning -- 3 Federated learning System for COVID-19 CXR Images -- 3.1 Basic Definition -- 3.2 Framework of the Federated Learning System.
4 Experiments -- 4.1 Dataset -- 4.2 Experimental Setting -- 4.3 Implementation and Training -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- A Novel Network Covert Channel Model Based on Blockchain Transaction Parity -- 1 Introduction -- 2 Related Works -- 2.1 Covert Channel -- 2.2 Blockchain -- 3 The Proposed Scheme -- 3.1 Framework -- 3.2 Parity Definition -- 3.3 Information Transmission -- 4 Performance Evaluation -- 5 Conclusion -- References -- An Improved CNN Model for Fast Salient Object Detection -- 1 Introduction -- 2 Related Work -- 2.1 Pyramid Pooling Module -- 2.2 PoolNet -- 2.3 Fire Module -- 2.4 AdaX -- 3 Optimizer -- 3.1 Optimizer Introduction -- 3.2 Compression Model -- 3.3 The Introduction of AdaX Optimizer for Adam Optimizer -- 4 Experimental Results -- 4.1 Loss Functions and Datasets -- 4.2 Evaluation Criteria -- 5 Conclusion -- References -- Control System Design of Transport Robot Based on Multi-color Recognition -- 1 Research Status -- 2 Handling Robot Design Requirements and Overall Design Plan -- 3 Tracking Module Software Design -- 4 Color Recognition Module -- 4.1 Working Mode and Working Principle of Color Sensor -- 4.2 Color Sensor Working Mode Software Configuration -- 4.3 Software Algorithm of Color Sensor -- 5 Research and Experiment of Robot Handling Planning Strategy -- 6 In Conclusion -- References -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- 1 Introduction -- 2 Background and Motivation -- 2.1 Cache Based Load Balancing -- 2.2 Cache Systems with Variable Object Sizes -- 2.3 Motivation -- 3 SACache System Design -- 3.1 SACache Architecture -- 3.2 Implementation -- 3.3 Request Path -- 3.4 Use Cases -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Result -- 5 Related Work -- 6 Conclusion -- Appendix A -- Appendix B -- References.
Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- 1 Introduction -- 2 Virtualization and Migration -- 2.1 Simulation -- 2.2 Virtual Machine -- 2.3 Containers -- 2.4 A Comparative Study -- 3 Typical Works -- 3.1 Interpreted Language Applications -- 3.2 Compiled Language Applications -- 3.3 Hybrid Applications -- 4 Purpose of Migration -- 4.1 Following User Mobility -- 4.2 Performance -- 4.3 Energy Efficiency -- 5 Discussions -- 5.1 Comparative Study -- 5.2 Scenarios and Selection -- 5.3 Open Research Issues -- 6 Conclusion -- References -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- 1 Introduction -- 2 Model -- 3 Machine Learning Algorithms Classify the Environments(s) -- 4 Results -- 4.1 Classification of s -- 4.2 Regression of s -- 5 Conclusion -- References -- Big Data -- W-Louvain: A Group Detection Algorithm Based on Synthetic Vectors -- 1 Introduction -- 2 The Design of the Group Detection Algorithm Based on Comprehensive Vector -- 2.1 Comprehensive Similarity Calculation Based on Comprehensive Vector Model -- 2.2 Design of W-Louvain Algorithm -- 3 Experiment -- 3.1 Datasets -- 3.2 Experiment Process -- 4 Conclusion -- References -- Application of Non-negative Matrix Factorization in Fault Detection of Distribution Network -- 1 Introduction -- 2 Introduction to NMF Related Algorithms -- 2.1 NMF Basic Algorithm -- 2.2 Projection Non-negative Matrix Factorization Algorithm -- 3 GPNMF Algorithm -- 4 Fault Detection Method Based on GPNMF -- 4.1 Monitoring Model Construction -- 5 Fault Detection Method Based on GPNMF -- 6 Simulation Verification -- 7 Conclusion -- References -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- 1 Introduction -- 2 Related Work -- 2.1 Main Path Analysis -- 2.2 PageRank.
3 Datasets -- 3.1 Datasets -- 3.2 Improved Method -- 3.3 Evaluation -- 4 Experiment Result -- 4.1 K-core Graph -- 4.2 Average Cited Frequency and Coverage -- 4.3 Discussion Main Paths and Related Domains -- 5 Conclusion -- References -- On-Chain and Off-Chain Collaborative Management System Based on Consortium Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Hyperledger Fabric -- 2.2 Transaction Process -- 3 Requirements Analysis -- 3.1 Application Scenario -- 3.2 Functional Module -- 4 Design and Implementation -- 4.1 Architecture Design -- 4.2 Smart Contract Design -- 5 Evaluation -- 5.1 Environment Configuration -- 5.2 Operating Environment -- 5.3 System Functions -- 5.4 System Performance -- 6 Conclusion -- References -- The Implementation of Aeronautical Information Exchange Model in SWIM -- 1 Introduction -- 2 Aeronautical Information Exchange Model -- 2.1 AIXM Overview -- 2.2 AIXM Composition -- 2.3 Time Slice Model -- 3 Method of Establishing AIXM -- 3.1 AIXM Modeling Process -- 3.2 AIXM UML Class Diagram Example (Airport/Heliport Class Diagram) -- 4 Modeling Process Realization -- 4.1 Process of Model Building Method -- 4.2 Source Data Processing -- 4.3 Model Test Results -- 5 Conclusion -- References -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- 1 Introduction -- 2 Related Work -- 3 Cascade Classifier Text Localization Algorithm -- 3.1 Cascade Classification Algorithm Based on Real AdaBoost -- 3.2 Perceptual-Based Text Grouping Algorithm -- 4 Experimental Results and Analysis -- 4.1 Experiments and Results of the First Level Classifier -- 4.2 Experiments and Results of the Second Level Classifier -- 4.3 Comparative Experiment and Analysis -- 5 Conclusion -- References -- Research on the Application of Big Data Analysis in University Library -- 1 First Section -- 2 Related Works.
3 Big Data Analysis Method -- 3.1 Correlation Analysis -- 3.2 Cluster Analysis -- 3.3 Recommendation Algorithm Based on Matrix Factorization -- 4 Application of Big Data Analysis in University Library -- 4.1 Data Collection -- 4.2 Data Processing and Analysis -- 4.3 Forecast of Data Processing and Analysis Results -- 4.4 Experimental Verification of Big Data Analysis -- 5 In Conclusion -- 5.1 Personalized Recommendation -- 5.2 Personalized Search -- 5.3 Decision Support -- References -- Research on Support Vector Machine in Traffic Detection Algorithm -- 1 Introduction -- 2 Related Works -- 3 First Section -- 3.1 Description of Classification Problem -- 3.2 Linear Separable Support Vector Machine -- 3.3 Linear Inseparable Support Vector Machine -- 4 Design of Event Detection Algorithm Based on SVM -- 4.1 The Principle and Design Process of SVM-AID Algorithm -- 4.2 Traffic Parameter Selection -- 4.3 Choice of Model and Kernel Function -- 4.4 Algorithm Simulation and Result Analysis -- 5 Summary -- References -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- 1 Introduction -- 2 Experimental Part -- 2.1 Experimental Materials -- 2.2 Instruments and Equipment -- 2.3 Experimental Pretreatment -- 2.4 Preparation of Buffer Material -- 2.5 Experimental Design of Different Fillers -- 3 Determination of Foam Properties -- 3.1 Determination of Buffer Coefficient -- 3.2 Determination of Resilience -- 3.3 Density Measurement -- 4 Results and Discussion -- 4.1 Properties of Foams with Different Fillers -- 4.2 Cushioning Properties of Foams with Different Fillers -- 4.3 Morphology of Foams with Different Fillers -- 4.4 Infrared Spectrum Analysis of Hemp Stalk Core/Corn Stalk Foam -- 4.5 DSC Analysis of Hemp Stalk Core/Corn Straw Foam -- 5 Conclusion -- References.
Research on Data Analysis to Improve English Vocabulary Learning Performance.
Record Nr. UNISA-996464515503316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui