top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data science . Part I : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, Proceedings / / Jianchao Zeng [and four others], (editors)
Data science . Part I : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, Proceedings / / Jianchao Zeng [and four others], (editors)
Pubbl/distr/stampa Singapore : , : Springer, , 2022
Descrizione fisica 1 online resource (558 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Data mining
ISBN 981-16-5940-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Big Data Management and Applications -- A Blockchain-Based Scheme of Data Sharing for Housing Provident Fund -- 1 Introduction -- 2 Motivation -- 3 Related Works -- 4 System Design Overview -- 5 The Specific Program -- 5.1 Data Sharing -- 5.2 Data Storing -- 5.3 Data Exchange -- 5.4 Authorization -- 5.5 Federal Computing -- 6 Case Study -- 6.1 Sichuan & -- Chongqing HPF System Integration -- 6.2 Extension of HPF Policy and Management in Chongqing -- 7 Conclusion and Future Work -- References -- Social Media and Recommendation Systems -- Item Recommendation Based on Monotonous Behavior Chains -- 1 Introduction -- 1.1 User-Commodity Interaction Monotonous Behavior Chain -- 1.2 Bipartite Link Prediction Considers Matrix Completion -- 2 Related Work -- 3 Problem Definition -- 3.1 User-Item Bipartite Graph Representation of Each Stage of Monotone Behavior Chain -- 3.2 Graph Link Prediction Solves the Matrix Completion Problem -- 4 Method -- 4.1 Graph Auto-encoder -- 4.2 Graph Encoder -- 4.3 Monotonic Behavior Decoder -- 4.4 Model Training -- 5 Experimental Setup -- 5.1 Datasets -- 5.2 Comparison Methods and Evaluation Methods -- 5.3 Parameter Settings -- 5.4 Experimental Results -- 6 Conclusions and Future Work -- References -- Design and Implementation of Collaborative Filtering Recommendation Algorithm for Multi-layer Networks -- 1 Introduction -- 2 Pre-requisite Knowledge -- 2.1 User-Based Collaborative Filtering Algorithm -- 2.2 Project-Based Collaborative Filtering Algorithm -- 2.3 Bipartite Graph Recommendation Algorithm -- 3 Recommendation Algorithms for Two-Layer Networks -- 3.1 Problem Formulation -- 3.2 Dataset Pre-processing -- 3.3 Two-Layer Network Characterization Analysis -- 3.4 Recommendation Algorithm Implementation -- 3.5 Algorithm Implementation Process.
4 Experimental Results -- 4.1 Evaluation Criteria -- 4.2 Selection of Parameters -- 4.3 Experimental Results -- 5 Summary and Prospect -- References -- Integrating Local Closure Coefficient into Weighted Networks for Link Prediction -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Notation -- 3.2 Problem Definition -- 3.3 General Weighted Similarity Metric -- 3.4 The Local Closure Coefficient -- 3.5 Weighted Local Closure Coefficient -- 3.6 Metric Extension -- 4 Experiments -- 4.1 Datatset -- 4.2 Comparison Methods and Evaluation Metric -- 4.3 Experiment Results -- 5 Conclusion -- References -- A Transformer Model-Based Approach to Bearing Fault Diagnosis -- 1 Introduction -- 2 Related Work -- 2.1 Status of Fault Diagnosis -- 2.2 Status of the Transformer -- 3 Fault Diagnosis Method Based on Transformer Model -- 3.1 Data Pre-processing Using the Short-Time Fourier Transform -- 3.2 Transformer-Based Approach to Image Classification -- 4 Experiment -- 4.1 Data Set Description -- 4.2 Experimental Setup Details and Benchmarking Algorithms -- 4.3 Experimental Results and Comparison Experiments -- 5 Conclusion and Future Works -- References -- Research and Simulation of Mass Random Data Association Rules Based on Fuzzy Cluster Analysis -- 1 Introduction -- 2 Construction of Association Rule Pattern for Mass Random Data Based on Fuzzy Cluster Analysis -- 2.1 The Principle of Fuzzy Cluster Analysis -- 3 Simulation Experiment Analysis -- 3.1 Raw Data Matrix Normalization -- 3.2 Dynamic Clustering -- 3.3 Dynamic Clustering Diagram -- 4 Conclusion -- References -- Predicting Stock Price Movement with Multiple Data Sources and Machine Learning Models -- 1 Introduction and Literature -- 2 Methodology -- 2.1 Data and Variables -- 2.2 Machine Learning Models -- 2.3 Model Evaluation Criteria -- 2.4 Model Validation -- 3 Results and Discussion.
3.1 Performance of Three Models Using Multiple Data Sources -- 3.2 Comparison of Bull and Bear Markets -- 3.3 Comparison of Inactive and Active Periods -- 4 Conclusion -- References -- Data-Driven Prediction of Foodborne Disease Pathogens -- 1 Introduction -- 2 Related Works -- 2.1 Methods Based on Surveillance Platform Data -- 2.2 Methods Based on Rapid Detection Technology -- 2.3 Methods Based on Machine Learning -- 3 Methods -- 3.1 Data Description -- 3.2 Data Preprocessing -- 3.3 Model Building -- 4 Experiments -- 4.1 Evaluation Criteria -- 4.2 Result -- 4.3 Limitations -- 5 Conclusion -- References -- Infrastructure for Data Science -- Intelligent Storage System of Machine Learning Model Based on Task Similarity -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Key Technologies -- 4.1 Similarity Verification -- 4.2 Scoring and Model Storage -- 5 Demonstration Scenarios -- References -- A Localization Algorithm in Wireless Sensor Network Based on Positioning Group Quality -- 1 Introduction -- 2 Related Works -- 3 Problem Identification and LA-PGQ Algorithm -- 3.1 Problem Identification -- 3.2 The Average Hop Size (AHS) -- 3.3 The LA-PGQ Algorithm -- 4 Simulation Results and Analysis -- 4.1 Simulation Results with Varying the Ratio of the Beacon Nodes -- 4.2 Simulation Results with Varying Communication Radius -- 5 Conclusions -- References -- A Collaborative Cache Strategy Based on Utility Optimization -- 1 Instruction -- 2 Related Work -- 3 System Architecture Construction -- 3.1 Hybrid CDN-P2P Architecture Model -- 3.2 The Aggregation of SPS -- 4 Problem Formulation and Algorithm -- 4.1 The Utility Optimization of ISP -- 4.2 The Collaborative Cache Strategy Based on Utility Optimization -- 5 Experiment Evaluation -- 5.1 Simulation Setting -- 5.2 Simulation Results -- 6 Conclusion -- References.
Research on Route Optimization of Battlefield Collection Equipment Based on Improved Ant Algorithm -- 1 Introduction -- 2 The Optimization Model of the Battlefield Collecting Equipment Path -- 2.1 Problem Description -- 2.2 Build Path Optimization Model -- 3 Improved Ant Algorithm -- 3.1 Principles of Ant Algorithm -- 3.2 The Basic Model of the Improved Ant Algorithm -- 3.3 Improved Ant Algorithm Process -- 4 Simulation Result -- 5 Conclusion -- References -- Parallel Region Reconstruction Technique for Sunway High-Performance Multi-core Processors -- 1 Introduction -- 2 Related Works -- 3 Parallel Region Reconstruction Technique -- 3.1 OpenMP Programming Model and Problem Analysis -- 3.2 Parallel Region Merging -- 3.3 Parallel Region Extending -- 3.4 Implementation of Parallel Region Reconstruction Technique -- 4 Experimental Evaluation -- 4.1 Experimental Environment, Benchmarks and Test Content -- 4.2 Experimental Results and Analyses -- 5 Conclusion -- References -- Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors -- 1 Introduction -- 2 Related Works -- 3 The Privileged Instruction-Based Thread-Private Variable Access Technique -- 3.1 Technique Realization Mode of Thread Private Variables in Sunway and Its Problems -- 3.2 Threaded Private Variable Access Techniques Based on Privileged Instructions -- 4 Experimental Evaluation -- 4.1 Experimental Environment, Benchmarks and Test Content -- 4.2 Experimental Results and Analyses -- 5 Conclusion -- References -- Basic Theory and Techniques for Data Science -- Anti-obfuscation Binary Code Clone Detection Based on Software Gene -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Overview -- 3.2 Basic Block Semantic Embedding -- 3.3 Semantic Embedding of Function Control Flow Graph -- 4 Experiments -- 4.1 Explore Instruction Segmentation Methods.
4.2 Model Training -- 4.3 p@n Test -- 5 Discussion -- 6 Conclusions -- References -- The Construction of Case Event Logic Graph for Judgment Documents -- 1 Introduction -- 2 Related Work -- 3 Construction Method -- 3.1 Research Framework -- 3.2 Construction of Event Logic Graph -- 4 Model -- 5 Experiment -- 6 Conclusion -- References -- Machine Learning for Data Science -- Improved Non-negative Matrix Factorization Algorithm for Sparse Graph Regularization -- 1 Introduction -- 2 NMF, GNMF Algorithm -- 3 New-SGNMF Algorithm Design -- 3.1 Algorithm Model of New-SGNMF -- 3.2 Algorithm Solution of New-SGNMF -- 3.3 Convergence Analysis of the Algorithm -- 3.4 New-SGNMF Algorithm Steps -- 4 Experimental Analysis -- 4.1 Experimental Database -- 4.2 Comparison of Different Algorithms -- 4.3 Evaluation Criteria Used -- 4.4 Experimental Result -- 5 Conclusions and Future Work -- References -- MA Mask R-CNN: MPR and AFPN Based Mask R-CNN -- 1 Introduction -- 2 Related Work -- 2.1 ResNet -- 2.2 FPN -- 2.3 ResNet + FPN Backbone -- 2.4 Attention Mechanism -- 3 Our Method -- 3.1 Multi-resolution Parallel ResNet (MPR) -- 3.2 Attention FPN (AFPN) -- 4 Experiments Results and Analysis -- 4.1 Main Result -- 4.2 Ablation Study -- 4.3 Bounding Box Detection Results -- 5 Conclusions -- References -- Generative Adversarial Network Based Status Generation Simulation Approach -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 Problem Definition -- 3.1 Influencing Factors Analysis -- 3.2 Status Generation for Electric Equipment -- 4 Proposed Approach -- 4.1 Conditional Information Modeling -- 4.2 Adversarial Training -- 4.3 Optimization -- 5 Experiments -- 5.1 Training Data and Baselines -- 5.2 Analysis -- 6 Conclusion -- References.
Research on Attitude Solving Algorithm of Towing Cable Based on Convolutional Neural Network Fusion Extended Kalman Filter.
Record Nr. UNINA-9910502658803321
Singapore : , : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data science . Part I : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, Proceedings / / Jianchao Zeng [and four others], (editors)
Data science . Part I : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, Proceedings / / Jianchao Zeng [and four others], (editors)
Pubbl/distr/stampa Singapore : , : Springer, , 2022
Descrizione fisica 1 online resource (558 pages)
Disciplina 006.3
Collana Communications in computer and information science
Soggetto topico Data mining
ISBN 981-16-5940-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Big Data Management and Applications -- A Blockchain-Based Scheme of Data Sharing for Housing Provident Fund -- 1 Introduction -- 2 Motivation -- 3 Related Works -- 4 System Design Overview -- 5 The Specific Program -- 5.1 Data Sharing -- 5.2 Data Storing -- 5.3 Data Exchange -- 5.4 Authorization -- 5.5 Federal Computing -- 6 Case Study -- 6.1 Sichuan & -- Chongqing HPF System Integration -- 6.2 Extension of HPF Policy and Management in Chongqing -- 7 Conclusion and Future Work -- References -- Social Media and Recommendation Systems -- Item Recommendation Based on Monotonous Behavior Chains -- 1 Introduction -- 1.1 User-Commodity Interaction Monotonous Behavior Chain -- 1.2 Bipartite Link Prediction Considers Matrix Completion -- 2 Related Work -- 3 Problem Definition -- 3.1 User-Item Bipartite Graph Representation of Each Stage of Monotone Behavior Chain -- 3.2 Graph Link Prediction Solves the Matrix Completion Problem -- 4 Method -- 4.1 Graph Auto-encoder -- 4.2 Graph Encoder -- 4.3 Monotonic Behavior Decoder -- 4.4 Model Training -- 5 Experimental Setup -- 5.1 Datasets -- 5.2 Comparison Methods and Evaluation Methods -- 5.3 Parameter Settings -- 5.4 Experimental Results -- 6 Conclusions and Future Work -- References -- Design and Implementation of Collaborative Filtering Recommendation Algorithm for Multi-layer Networks -- 1 Introduction -- 2 Pre-requisite Knowledge -- 2.1 User-Based Collaborative Filtering Algorithm -- 2.2 Project-Based Collaborative Filtering Algorithm -- 2.3 Bipartite Graph Recommendation Algorithm -- 3 Recommendation Algorithms for Two-Layer Networks -- 3.1 Problem Formulation -- 3.2 Dataset Pre-processing -- 3.3 Two-Layer Network Characterization Analysis -- 3.4 Recommendation Algorithm Implementation -- 3.5 Algorithm Implementation Process.
4 Experimental Results -- 4.1 Evaluation Criteria -- 4.2 Selection of Parameters -- 4.3 Experimental Results -- 5 Summary and Prospect -- References -- Integrating Local Closure Coefficient into Weighted Networks for Link Prediction -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Notation -- 3.2 Problem Definition -- 3.3 General Weighted Similarity Metric -- 3.4 The Local Closure Coefficient -- 3.5 Weighted Local Closure Coefficient -- 3.6 Metric Extension -- 4 Experiments -- 4.1 Datatset -- 4.2 Comparison Methods and Evaluation Metric -- 4.3 Experiment Results -- 5 Conclusion -- References -- A Transformer Model-Based Approach to Bearing Fault Diagnosis -- 1 Introduction -- 2 Related Work -- 2.1 Status of Fault Diagnosis -- 2.2 Status of the Transformer -- 3 Fault Diagnosis Method Based on Transformer Model -- 3.1 Data Pre-processing Using the Short-Time Fourier Transform -- 3.2 Transformer-Based Approach to Image Classification -- 4 Experiment -- 4.1 Data Set Description -- 4.2 Experimental Setup Details and Benchmarking Algorithms -- 4.3 Experimental Results and Comparison Experiments -- 5 Conclusion and Future Works -- References -- Research and Simulation of Mass Random Data Association Rules Based on Fuzzy Cluster Analysis -- 1 Introduction -- 2 Construction of Association Rule Pattern for Mass Random Data Based on Fuzzy Cluster Analysis -- 2.1 The Principle of Fuzzy Cluster Analysis -- 3 Simulation Experiment Analysis -- 3.1 Raw Data Matrix Normalization -- 3.2 Dynamic Clustering -- 3.3 Dynamic Clustering Diagram -- 4 Conclusion -- References -- Predicting Stock Price Movement with Multiple Data Sources and Machine Learning Models -- 1 Introduction and Literature -- 2 Methodology -- 2.1 Data and Variables -- 2.2 Machine Learning Models -- 2.3 Model Evaluation Criteria -- 2.4 Model Validation -- 3 Results and Discussion.
3.1 Performance of Three Models Using Multiple Data Sources -- 3.2 Comparison of Bull and Bear Markets -- 3.3 Comparison of Inactive and Active Periods -- 4 Conclusion -- References -- Data-Driven Prediction of Foodborne Disease Pathogens -- 1 Introduction -- 2 Related Works -- 2.1 Methods Based on Surveillance Platform Data -- 2.2 Methods Based on Rapid Detection Technology -- 2.3 Methods Based on Machine Learning -- 3 Methods -- 3.1 Data Description -- 3.2 Data Preprocessing -- 3.3 Model Building -- 4 Experiments -- 4.1 Evaluation Criteria -- 4.2 Result -- 4.3 Limitations -- 5 Conclusion -- References -- Infrastructure for Data Science -- Intelligent Storage System of Machine Learning Model Based on Task Similarity -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Key Technologies -- 4.1 Similarity Verification -- 4.2 Scoring and Model Storage -- 5 Demonstration Scenarios -- References -- A Localization Algorithm in Wireless Sensor Network Based on Positioning Group Quality -- 1 Introduction -- 2 Related Works -- 3 Problem Identification and LA-PGQ Algorithm -- 3.1 Problem Identification -- 3.2 The Average Hop Size (AHS) -- 3.3 The LA-PGQ Algorithm -- 4 Simulation Results and Analysis -- 4.1 Simulation Results with Varying the Ratio of the Beacon Nodes -- 4.2 Simulation Results with Varying Communication Radius -- 5 Conclusions -- References -- A Collaborative Cache Strategy Based on Utility Optimization -- 1 Instruction -- 2 Related Work -- 3 System Architecture Construction -- 3.1 Hybrid CDN-P2P Architecture Model -- 3.2 The Aggregation of SPS -- 4 Problem Formulation and Algorithm -- 4.1 The Utility Optimization of ISP -- 4.2 The Collaborative Cache Strategy Based on Utility Optimization -- 5 Experiment Evaluation -- 5.1 Simulation Setting -- 5.2 Simulation Results -- 6 Conclusion -- References.
Research on Route Optimization of Battlefield Collection Equipment Based on Improved Ant Algorithm -- 1 Introduction -- 2 The Optimization Model of the Battlefield Collecting Equipment Path -- 2.1 Problem Description -- 2.2 Build Path Optimization Model -- 3 Improved Ant Algorithm -- 3.1 Principles of Ant Algorithm -- 3.2 The Basic Model of the Improved Ant Algorithm -- 3.3 Improved Ant Algorithm Process -- 4 Simulation Result -- 5 Conclusion -- References -- Parallel Region Reconstruction Technique for Sunway High-Performance Multi-core Processors -- 1 Introduction -- 2 Related Works -- 3 Parallel Region Reconstruction Technique -- 3.1 OpenMP Programming Model and Problem Analysis -- 3.2 Parallel Region Merging -- 3.3 Parallel Region Extending -- 3.4 Implementation of Parallel Region Reconstruction Technique -- 4 Experimental Evaluation -- 4.1 Experimental Environment, Benchmarks and Test Content -- 4.2 Experimental Results and Analyses -- 5 Conclusion -- References -- Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors -- 1 Introduction -- 2 Related Works -- 3 The Privileged Instruction-Based Thread-Private Variable Access Technique -- 3.1 Technique Realization Mode of Thread Private Variables in Sunway and Its Problems -- 3.2 Threaded Private Variable Access Techniques Based on Privileged Instructions -- 4 Experimental Evaluation -- 4.1 Experimental Environment, Benchmarks and Test Content -- 4.2 Experimental Results and Analyses -- 5 Conclusion -- References -- Basic Theory and Techniques for Data Science -- Anti-obfuscation Binary Code Clone Detection Based on Software Gene -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Overview -- 3.2 Basic Block Semantic Embedding -- 3.3 Semantic Embedding of Function Control Flow Graph -- 4 Experiments -- 4.1 Explore Instruction Segmentation Methods.
4.2 Model Training -- 4.3 p@n Test -- 5 Discussion -- 6 Conclusions -- References -- The Construction of Case Event Logic Graph for Judgment Documents -- 1 Introduction -- 2 Related Work -- 3 Construction Method -- 3.1 Research Framework -- 3.2 Construction of Event Logic Graph -- 4 Model -- 5 Experiment -- 6 Conclusion -- References -- Machine Learning for Data Science -- Improved Non-negative Matrix Factorization Algorithm for Sparse Graph Regularization -- 1 Introduction -- 2 NMF, GNMF Algorithm -- 3 New-SGNMF Algorithm Design -- 3.1 Algorithm Model of New-SGNMF -- 3.2 Algorithm Solution of New-SGNMF -- 3.3 Convergence Analysis of the Algorithm -- 3.4 New-SGNMF Algorithm Steps -- 4 Experimental Analysis -- 4.1 Experimental Database -- 4.2 Comparison of Different Algorithms -- 4.3 Evaluation Criteria Used -- 4.4 Experimental Result -- 5 Conclusions and Future Work -- References -- MA Mask R-CNN: MPR and AFPN Based Mask R-CNN -- 1 Introduction -- 2 Related Work -- 2.1 ResNet -- 2.2 FPN -- 2.3 ResNet + FPN Backbone -- 2.4 Attention Mechanism -- 3 Our Method -- 3.1 Multi-resolution Parallel ResNet (MPR) -- 3.2 Attention FPN (AFPN) -- 4 Experiments Results and Analysis -- 4.1 Main Result -- 4.2 Ablation Study -- 4.3 Bounding Box Detection Results -- 5 Conclusions -- References -- Generative Adversarial Network Based Status Generation Simulation Approach -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background -- 2.2 Related Work -- 3 Problem Definition -- 3.1 Influencing Factors Analysis -- 3.2 Status Generation for Electric Equipment -- 4 Proposed Approach -- 4.1 Conditional Information Modeling -- 4.2 Adversarial Training -- 4.3 Optimization -- 5 Experiments -- 5.1 Training Data and Baselines -- 5.2 Analysis -- 6 Conclusion -- References.
Research on Attitude Solving Algorithm of Towing Cable Based on Convolutional Neural Network Fusion Extended Kalman Filter.
Record Nr. UNISA-996464526403316
Singapore : , : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data science . Part II : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, proceedings / / Jianchao Zeng [and four others]
Data science . Part II : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, proceedings / / Jianchao Zeng [and four others]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (532 pages)
Disciplina 006.312
Collana Communications in Computer and Information Science
Soggetto topico Data mining
Big data
ISBN 981-16-5943-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Social Media and Recommendation Systems -- Natural Language Inference Using Evidence from Knowledge Graphs -- 1 Introduction -- 2 Related Work -- 3 Model Architecture -- 3.1 Clue Extraction -- 3.2 Evidence and Sentence Encoding -- 3.3 Evidence Integration -- 3.4 Final Classifier -- 4 Experiments -- 4.1 Datasets and Knowledge Resources -- 4.2 Effectiveness of Different KGs and Clue Encoders -- 4.3 Experiments on MedNLI -- 4.4 Experiments on SciTail -- 4.5 Implementation Details -- 5 Conclusion and Future Works -- References -- Construction of Multimodal Chinese Tourism Knowledge Graph -- 1 Introduction -- 2 Related Work -- 3 MCTKG Construction -- 3.1 Semi-structured Knowledge Extraction -- 3.2 Entity Expansion -- 3.3 Ontology Construction -- 3.4 Attribute Normalization -- 3.5 Automatic Generation Algorithm of Tourist Routes -- 3.6 MCTKG Sharing Platform -- 4 Experiments -- 4.1 Attribute Normalization Evaluation -- 4.2 Route Evaluation -- 5 Conclusion -- References -- Study on Binary Code Evolution with Concrete Semantic Analysis -- 1 Introduction -- 2 Approach Overview -- 2.1 Motivation Example -- 2.2 Problem Statement -- 2.3 Frame of Overview -- 3 Methodology -- 3.1 Comparing Similarity -- 3.2 Locating Difference -- 3.3 Analyzing Semantic Patterns -- 3.4 Identifying Evolution -- 4 Evaluation -- 4.1 Locating Difference -- 4.2 What Semantics Are Evolved -- 5 Related Work -- 6 Conclusion -- References -- Research on COVID-19 Internet Derived Public Opinions Prediction Based on the Event Evolution Graph -- 1 Introduction -- 2 The Method and Steps of Building the Event Evolution Graph -- 2.1 Data Acquisition and Preprocessing -- 2.2 Causal Judgment and Event Extraction -- 2.3 Text Vectorization and Event Clustering.
3 An Empirical Study of COVID-19 Network Public Opinion Event Evolution Graph -- 3.1 COVID-19 Event Data Acquisition and Preprocessing -- 3.2 COVID-19 Event Data Acquisition and Preprocessing -- 3.3 The Construction of Event Evolution Graph -- 4 Analysis and Discussion -- 5 Conclusion -- References -- A Text Correlation Algorithm for Stock Market News Event Extraction -- 1 Introduction -- 2 Related Work -- 2.1 Extraction of Stock Market News Information -- 2.2 Text Correlation Algorithm -- 3 Our Proposed Method -- 3.1 Word Vector Model -- 3.2 Structured Event and Event Vector -- 3.3 Text Correlation Algorithm Based on Matching and Clustering -- 4 Experiments -- 4.1 Data Collection and Preprocessing -- 4.2 Relevance Between Words -- 4.3 Correlation Between Event Triples -- 4.4 Relevance Between Texts -- 4.5 Correlation Between Text Sets -- 4.6 Interpretable Information of Correlation Calculation -- 5 Conclusion -- References -- Citation Recommendation Based on Community Merging and Time Effect -- 1 Introduction -- 2 Problem Statement -- 3 Community Merging -- 4 CMTE-PathSim Model -- 4.1 Meta Path-Based Feature Space -- 4.2 Citation Probability -- 4.3 Time Effect -- 4.4 Citation Recommendation -- 5 Experiments -- 5.1 Dataset and Methods Setup -- 5.2 Verifying Time Effect Factor -- 5.3 Comparison with Benchmark Algorithm -- 6 Conclusions and Future Work -- References -- Sentiment Analysis for MOOC Course Reviews -- 1 Introduction -- 2 Related Work -- 3 MOOC Text Comment Sentiment Analysis Model -- 3.1 ALBERT Pre-trained Language Model -- 3.2 BiGRU Neural Network Model -- 3.3 Capsule Network -- 3.4 Attention Mechanism -- 3.5 Fully Connected Layer -- 4 Experimental Analysis -- 4.1 Introduction to the Data Set -- 4.2 Evaluation Standard -- 4.3 Experimental Comparison Model -- 4.4 Analysis of Experimental Results -- 5 Conclusion -- References.
Analyzing Interpretability Semantically via CNN Visualization -- 1 Introduction -- 2 Related Work -- 3 Interpretation by Filters Screening and Semantic Labeling -- 3.1 Data Preparation -- 3.2 Screening Convolution Features -- 3.3 Deconvolutional Visualization -- 3.4 Semantic Annotation of Filters -- 4 Experiments -- 4.1 Visualization of Screened Filters -- 4.2 The Coincidence Degree of Interpretable Regions and Expert Regions -- 4.3 Semantic Consistency of Filters -- 5 Conclusion -- References -- Probing Filters to Interpret CNN Semantic Configurations by Occlusion -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset and Semantic Configurations -- 3.2 Probe Filters to Recognize Specified Visual Semantic Concepts by Occluding -- 3.3 Visualization for Evaluation -- 4 Experiment -- 4.1 Dataset and Experimental Setup -- 4.2 Annotation Task -- 4.3 Experiment Result -- 5 Conclusion -- References -- Targeted BERT Pre-training and Fine-Tuning Approach for Entity Relation Extraction -- 1 Introduction -- 2 Related Work -- 2.1 Methods with Distant Supervision -- 2.2 Methods with Pre-trained Language Model -- 3 Methodology -- 3.1 Separated Pipeline Model Architecture -- 3.2 Verb-mLM Task for Relation Classification Model -- 3.3 Entity-MLM Task for Entity-Pair Annotation Model -- 3.4 Inter-layer Sharing Attention Mechanism -- 4 Experiments -- 4.1 Datasets -- 4.2 Experiment on Entity Relation Classification -- 4.3 Experiment on Entity-Pair Annotation -- 4.4 Results Analysis -- 5 Conclusion -- References -- Data Security and Privacy -- Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud -- 1 Introduction -- 2 Background -- 3 SECaaS -- 3.1 User's Perception Module -- 3.2 Decision Module -- 3.3 Multi-compiler -- 3.4 Cyberspace Mimic Environments -- 4 Experiments -- 4.1 Security Experiments -- 4.2 Performance Evaluation.
5 Related Works -- 5.1 Multi-compiler -- 5.2 MVEE -- 6 Conclusion and Future Works -- References -- Searchable Encryption System for Big Data Storage -- 1 Introduction -- 2 Functional Interaction Model and System Architecture -- 2.1 Functional Interaction Model -- 2.2 System Architecture -- 3 Main Cryptographic Algorithm -- 3.1 Key Management Algorithm -- 3.2 File Classification Encryption/Decryption Algorithm -- 3.3 Symmetric Searchable Encryption Algorithm -- 3.4 Dynamic Update of Cipher Index -- 4 Deployment and System Test -- 4.1 Deployment -- 4.2 System Test -- 4.3 Advantage Analysis -- 5 Conclusion -- References -- Research on Plaintext Resilient Encrypted Communication Based on Generative Adversarial Network -- 1 Introduction -- 2 Adversarial Neural Cryptography -- 2.1 GANs Principle -- 2.2 Adversarial Neural Cryptography Model -- 2.3 Function Design -- 3 Plaintext Leakage in the Original Model -- 3.1 Neural Network Design in the Original Model -- 3.2 Leakage Experiments Under the Original Model -- 4 Model Optimization -- 4.1 Increase Decryption Speed -- 4.2 Decrease the Correct Rate of Attacker's Cracking -- 5 Conclusions -- References -- An Improved LeNet-5 Model Based on Encrypted Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Homomorphic Encryption -- 2.2 Convolutional Neural Network -- 2.3 LeNet-5 Model -- 3 Improved LeNet-5 Model in Ciphertext Domain -- 3.1 Mapping from the Plaintext Domain to the Ciphertext Domain -- 3.2 Improved LeNet-5 Model -- 4 Model Analysis -- 4.1 Feasibility Analysis -- 4.2 Efficiency Analysis -- 5 Conclusions -- References -- Design and Implementation of Intrusion Detection System Based on Neural Network -- 1 Introduction -- 2 Related Technologies -- 2.1 Intrusion Detection System -- 2.2 BP Neural Network -- 3 Design of Intrusion Detection System Based on Neural Network -- 3.1 System Framework.
3.2 Event Collector -- 3.3 Event Analyzer -- 4 Intrusion Detection Experiment Based on Neural Network -- 4.1 Experimental Environment -- 4.2 Experimental Results and Analysis -- 5 Conclusions -- References -- IoT Security Situational Awareness Based on Q-Learning and Bayesian Game -- 1 Introduction -- 2 Related Works -- 3 Q-Learning Algorithm -- 3.1 Markov Decision Process -- 3.2 Q-Learning Method -- 4 IoT Security Situational Awareness Model Based on Q-Learning and Bayesian Game -- 4.1 Characteristics of IoT Security -- 4.2 Model Selection and Definition -- 4.3 Selection of the Optimal Defense Strategy -- 4.4 IoT Security Situational Assessment -- 4.5 Model Algorithm -- 5 Experimental Simulation -- 5.1 Experimental Setup -- 5.2 Analysis of Results -- 6 Conclusion -- References -- Protecting Web Application Code and Sensitive Data with Symmetric and Identity-Based Cryptosystems -- 1 Introduction -- 2 Symmetric and Public Key Cryptographic Algorithms -- 2.1 Symmetric Cryptographic Algorithms -- 2.2 Public-Key Cryptographic Algorithms -- 3 Web Security Scheme for Protecting Sensitive Data and Program Code -- 3.1 The Idea and General Architecture -- 3.2 The Security Scheme -- 3.3 Experimental Results and Performance -- 3.4 Security Analysis -- 4 Conclusion -- References -- IoT Honeypot Scanning and Detection System Based on Authorization Mechanism -- 1 Introduction -- 2 Related Work -- 2.1 Network Scanning and Detection -- 2.2 IoT Honeypot -- 3 IoT Honeypot Scanning and Detection System Based on Authorization Mechanism -- 3.1 Authorization System -- 3.2 Honeypot System -- 4 Experiments -- 5 Conclusion -- References -- Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 zk-SNARK -- 3.2 CP-ABE -- 3.3 Blockchain Data Sharing Model.
4 Privacy Protection Model for Blockchain Data Sharing.
Record Nr. UNISA-996464526903316
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data science . Part II : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, proceedings / / Jianchao Zeng [and four others]
Data science . Part II : 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, proceedings / / Jianchao Zeng [and four others]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (532 pages)
Disciplina 006.312
Collana Communications in Computer and Information Science
Soggetto topico Data mining
Big data
ISBN 981-16-5943-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Social Media and Recommendation Systems -- Natural Language Inference Using Evidence from Knowledge Graphs -- 1 Introduction -- 2 Related Work -- 3 Model Architecture -- 3.1 Clue Extraction -- 3.2 Evidence and Sentence Encoding -- 3.3 Evidence Integration -- 3.4 Final Classifier -- 4 Experiments -- 4.1 Datasets and Knowledge Resources -- 4.2 Effectiveness of Different KGs and Clue Encoders -- 4.3 Experiments on MedNLI -- 4.4 Experiments on SciTail -- 4.5 Implementation Details -- 5 Conclusion and Future Works -- References -- Construction of Multimodal Chinese Tourism Knowledge Graph -- 1 Introduction -- 2 Related Work -- 3 MCTKG Construction -- 3.1 Semi-structured Knowledge Extraction -- 3.2 Entity Expansion -- 3.3 Ontology Construction -- 3.4 Attribute Normalization -- 3.5 Automatic Generation Algorithm of Tourist Routes -- 3.6 MCTKG Sharing Platform -- 4 Experiments -- 4.1 Attribute Normalization Evaluation -- 4.2 Route Evaluation -- 5 Conclusion -- References -- Study on Binary Code Evolution with Concrete Semantic Analysis -- 1 Introduction -- 2 Approach Overview -- 2.1 Motivation Example -- 2.2 Problem Statement -- 2.3 Frame of Overview -- 3 Methodology -- 3.1 Comparing Similarity -- 3.2 Locating Difference -- 3.3 Analyzing Semantic Patterns -- 3.4 Identifying Evolution -- 4 Evaluation -- 4.1 Locating Difference -- 4.2 What Semantics Are Evolved -- 5 Related Work -- 6 Conclusion -- References -- Research on COVID-19 Internet Derived Public Opinions Prediction Based on the Event Evolution Graph -- 1 Introduction -- 2 The Method and Steps of Building the Event Evolution Graph -- 2.1 Data Acquisition and Preprocessing -- 2.2 Causal Judgment and Event Extraction -- 2.3 Text Vectorization and Event Clustering.
3 An Empirical Study of COVID-19 Network Public Opinion Event Evolution Graph -- 3.1 COVID-19 Event Data Acquisition and Preprocessing -- 3.2 COVID-19 Event Data Acquisition and Preprocessing -- 3.3 The Construction of Event Evolution Graph -- 4 Analysis and Discussion -- 5 Conclusion -- References -- A Text Correlation Algorithm for Stock Market News Event Extraction -- 1 Introduction -- 2 Related Work -- 2.1 Extraction of Stock Market News Information -- 2.2 Text Correlation Algorithm -- 3 Our Proposed Method -- 3.1 Word Vector Model -- 3.2 Structured Event and Event Vector -- 3.3 Text Correlation Algorithm Based on Matching and Clustering -- 4 Experiments -- 4.1 Data Collection and Preprocessing -- 4.2 Relevance Between Words -- 4.3 Correlation Between Event Triples -- 4.4 Relevance Between Texts -- 4.5 Correlation Between Text Sets -- 4.6 Interpretable Information of Correlation Calculation -- 5 Conclusion -- References -- Citation Recommendation Based on Community Merging and Time Effect -- 1 Introduction -- 2 Problem Statement -- 3 Community Merging -- 4 CMTE-PathSim Model -- 4.1 Meta Path-Based Feature Space -- 4.2 Citation Probability -- 4.3 Time Effect -- 4.4 Citation Recommendation -- 5 Experiments -- 5.1 Dataset and Methods Setup -- 5.2 Verifying Time Effect Factor -- 5.3 Comparison with Benchmark Algorithm -- 6 Conclusions and Future Work -- References -- Sentiment Analysis for MOOC Course Reviews -- 1 Introduction -- 2 Related Work -- 3 MOOC Text Comment Sentiment Analysis Model -- 3.1 ALBERT Pre-trained Language Model -- 3.2 BiGRU Neural Network Model -- 3.3 Capsule Network -- 3.4 Attention Mechanism -- 3.5 Fully Connected Layer -- 4 Experimental Analysis -- 4.1 Introduction to the Data Set -- 4.2 Evaluation Standard -- 4.3 Experimental Comparison Model -- 4.4 Analysis of Experimental Results -- 5 Conclusion -- References.
Analyzing Interpretability Semantically via CNN Visualization -- 1 Introduction -- 2 Related Work -- 3 Interpretation by Filters Screening and Semantic Labeling -- 3.1 Data Preparation -- 3.2 Screening Convolution Features -- 3.3 Deconvolutional Visualization -- 3.4 Semantic Annotation of Filters -- 4 Experiments -- 4.1 Visualization of Screened Filters -- 4.2 The Coincidence Degree of Interpretable Regions and Expert Regions -- 4.3 Semantic Consistency of Filters -- 5 Conclusion -- References -- Probing Filters to Interpret CNN Semantic Configurations by Occlusion -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset and Semantic Configurations -- 3.2 Probe Filters to Recognize Specified Visual Semantic Concepts by Occluding -- 3.3 Visualization for Evaluation -- 4 Experiment -- 4.1 Dataset and Experimental Setup -- 4.2 Annotation Task -- 4.3 Experiment Result -- 5 Conclusion -- References -- Targeted BERT Pre-training and Fine-Tuning Approach for Entity Relation Extraction -- 1 Introduction -- 2 Related Work -- 2.1 Methods with Distant Supervision -- 2.2 Methods with Pre-trained Language Model -- 3 Methodology -- 3.1 Separated Pipeline Model Architecture -- 3.2 Verb-mLM Task for Relation Classification Model -- 3.3 Entity-MLM Task for Entity-Pair Annotation Model -- 3.4 Inter-layer Sharing Attention Mechanism -- 4 Experiments -- 4.1 Datasets -- 4.2 Experiment on Entity Relation Classification -- 4.3 Experiment on Entity-Pair Annotation -- 4.4 Results Analysis -- 5 Conclusion -- References -- Data Security and Privacy -- Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud -- 1 Introduction -- 2 Background -- 3 SECaaS -- 3.1 User's Perception Module -- 3.2 Decision Module -- 3.3 Multi-compiler -- 3.4 Cyberspace Mimic Environments -- 4 Experiments -- 4.1 Security Experiments -- 4.2 Performance Evaluation.
5 Related Works -- 5.1 Multi-compiler -- 5.2 MVEE -- 6 Conclusion and Future Works -- References -- Searchable Encryption System for Big Data Storage -- 1 Introduction -- 2 Functional Interaction Model and System Architecture -- 2.1 Functional Interaction Model -- 2.2 System Architecture -- 3 Main Cryptographic Algorithm -- 3.1 Key Management Algorithm -- 3.2 File Classification Encryption/Decryption Algorithm -- 3.3 Symmetric Searchable Encryption Algorithm -- 3.4 Dynamic Update of Cipher Index -- 4 Deployment and System Test -- 4.1 Deployment -- 4.2 System Test -- 4.3 Advantage Analysis -- 5 Conclusion -- References -- Research on Plaintext Resilient Encrypted Communication Based on Generative Adversarial Network -- 1 Introduction -- 2 Adversarial Neural Cryptography -- 2.1 GANs Principle -- 2.2 Adversarial Neural Cryptography Model -- 2.3 Function Design -- 3 Plaintext Leakage in the Original Model -- 3.1 Neural Network Design in the Original Model -- 3.2 Leakage Experiments Under the Original Model -- 4 Model Optimization -- 4.1 Increase Decryption Speed -- 4.2 Decrease the Correct Rate of Attacker's Cracking -- 5 Conclusions -- References -- An Improved LeNet-5 Model Based on Encrypted Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Homomorphic Encryption -- 2.2 Convolutional Neural Network -- 2.3 LeNet-5 Model -- 3 Improved LeNet-5 Model in Ciphertext Domain -- 3.1 Mapping from the Plaintext Domain to the Ciphertext Domain -- 3.2 Improved LeNet-5 Model -- 4 Model Analysis -- 4.1 Feasibility Analysis -- 4.2 Efficiency Analysis -- 5 Conclusions -- References -- Design and Implementation of Intrusion Detection System Based on Neural Network -- 1 Introduction -- 2 Related Technologies -- 2.1 Intrusion Detection System -- 2.2 BP Neural Network -- 3 Design of Intrusion Detection System Based on Neural Network -- 3.1 System Framework.
3.2 Event Collector -- 3.3 Event Analyzer -- 4 Intrusion Detection Experiment Based on Neural Network -- 4.1 Experimental Environment -- 4.2 Experimental Results and Analysis -- 5 Conclusions -- References -- IoT Security Situational Awareness Based on Q-Learning and Bayesian Game -- 1 Introduction -- 2 Related Works -- 3 Q-Learning Algorithm -- 3.1 Markov Decision Process -- 3.2 Q-Learning Method -- 4 IoT Security Situational Awareness Model Based on Q-Learning and Bayesian Game -- 4.1 Characteristics of IoT Security -- 4.2 Model Selection and Definition -- 4.3 Selection of the Optimal Defense Strategy -- 4.4 IoT Security Situational Assessment -- 4.5 Model Algorithm -- 5 Experimental Simulation -- 5.1 Experimental Setup -- 5.2 Analysis of Results -- 6 Conclusion -- References -- Protecting Web Application Code and Sensitive Data with Symmetric and Identity-Based Cryptosystems -- 1 Introduction -- 2 Symmetric and Public Key Cryptographic Algorithms -- 2.1 Symmetric Cryptographic Algorithms -- 2.2 Public-Key Cryptographic Algorithms -- 3 Web Security Scheme for Protecting Sensitive Data and Program Code -- 3.1 The Idea and General Architecture -- 3.2 The Security Scheme -- 3.3 Experimental Results and Performance -- 3.4 Security Analysis -- 4 Conclusion -- References -- IoT Honeypot Scanning and Detection System Based on Authorization Mechanism -- 1 Introduction -- 2 Related Work -- 2.1 Network Scanning and Detection -- 2.2 IoT Honeypot -- 3 IoT Honeypot Scanning and Detection System Based on Authorization Mechanism -- 3.1 Authorization System -- 3.2 Honeypot System -- 4 Experiments -- 5 Conclusion -- References -- Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 zk-SNARK -- 3.2 CP-ABE -- 3.3 Blockchain Data Sharing Model.
4 Privacy Protection Model for Blockchain Data Sharing.
Record Nr. UNINA-9910502645603321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Science [[electronic resource] ] : 6th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2020, Taiyuan, China, September 18-21, 2020, Proceedings, Part I / / edited by Jianchao Zeng, Weipeng Jing, Xianhua Song, Zeguang Lu
Data Science [[electronic resource] ] : 6th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2020, Taiyuan, China, September 18-21, 2020, Proceedings, Part I / / edited by Jianchao Zeng, Weipeng Jing, Xianhua Song, Zeguang Lu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXV, 720 p. 348 illus., 227 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data mining
Artificial intelligence
Application software
Computer communication systems
Architecture, Computer
Data structures (Computer science)
Data Mining and Knowledge Discovery
Artificial Intelligence
Information Systems Applications (incl. Internet)
Computer Communication Networks
Computer System Implementation
Data Structures and Information Theory
ISBN 981-15-7981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database -- Machine Learning -- Network -- Graphic images -- System.
Record Nr. UNISA-996465449903316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data Science : 6th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2020, Taiyuan, China, September 18-21, 2020, Proceedings, Part I / / edited by Jianchao Zeng, Weipeng Jing, Xianhua Song, Zeguang Lu
Data Science : 6th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2020, Taiyuan, China, September 18-21, 2020, Proceedings, Part I / / edited by Jianchao Zeng, Weipeng Jing, Xianhua Song, Zeguang Lu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXV, 720 p. 348 illus., 227 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data mining
Artificial intelligence
Application software
Computer communication systems
Architecture, Computer
Data structures (Computer science)
Data Mining and Knowledge Discovery
Artificial Intelligence
Information Systems Applications (incl. Internet)
Computer Communication Networks
Computer System Implementation
Data Structures and Information Theory
ISBN 981-15-7981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database -- Machine Learning -- Network -- Graphic images -- System.
Record Nr. UNINA-9910416081203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui