Image de couverture de Advances in Artificial Intelligence and Security 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Advances in Artificial Intelligence and Security 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Titre:
Advances in Artificial Intelligence and Security 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
ISBN (Numéro international normalisé des livres):
9783030786182
Edition:
1st ed. 2021.
PRODUCTION_INFO:
Cham : Springer International Publishing : Imprint: Springer, 2021.
Description physique:
XVIII, 746 p. 111 illus. online resource.
Collections:
Communications in Computer and Information Science, 1423
Table des matières:
Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in fault detection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter -- Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition.
Extrait:
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. .
Auteur collectif ajouté:
Langue:
Anglais