Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. 

The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows:

Part I: artificial intelligence;

Part II: artificial intelligence; big data; cloud computing and security internet; 

Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. 

Artificial Intelligence.- An approach based on demand prediction with
LSTM for solving multi-batch 2D cutting stock problems.- The identification
of slope crack based on convolutional neural network.- Multi-dimensional
fatigue driving detection method based on SVM improved by the kernel
function.- Experiments of Federated Learning for COVID-19 Chest X-ray
Images.- A Novel Network Covert Channel Model based on Blockchain Transaction
Parity.- An Improved CNN Model for Fast Salient Object Detection.- Control
system design of transport Robot based on Multi-color Recognition.- SACache:
Size-Aware Load Balancing for Large-Scale Storage Systems.- Heterogeneous-ISA
Application Migration in Edge Computing: Challenges, Techniques and Open
Issues.- The Interaction Between Probe and Cavity Field Assists Quantum
Synchronization.- Big Data.- W-LouvainA Group Detection Algorithm Based On
Synthetic Vectors.- Application of non-negative matrix factorization in
faultdetection of distribution network.- Patent Citation Network Analysis
Based on Improved Main Path Analysis: Mapping Key Technology Trajectory.-
On-chain and Off-chain Collaborative Management System Based on Consortium
Blockchain.- The Implementation of Aeronautical Information Exchange Model in
SWIM.- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene
Image.- Research on the Application of Big Data Analysis in University
Library.- Research on Support Vector Machine in Traffic Detection Algorithm.-
Application Research on Crop Straw Biomass Waste in Logistics Packaging
System.- Research On Data Analysis To Improve English Vocabulary Learning
Performance.- Hungarian Method in a car-sharing system application research.-
Network Topology Discovery Based on Classification Algorithm.- Research on
Feature Words for IoT Device Recognition Based on Word2vec.- Coverless
Information Hiding Method Based on Combination Morse code and Double Cycle
Application of Starter.- Application of Grey Forecasting Model to CPI Index
Forecast.- A Preliminary Study about Star Image Processing Method in Harsh
Environment.- Combining Turning Point Detection with Grid Transformation for
Road Intersection Detection.- Evaluation of Training Effect of New
Professional Farmers  Based on BP Neural Network.- Evaluation of training
effect of new-type professional Farmer based on cloud model.- A study on the
characteristics of college students' consumption behavior based on clustering
and association rules.- Research and Application of Nuclear Reactor
Computational Data Framework Based on HDF5.- Exploiting API description
information to improve code comment generation.- A Tag Recommendation Method
for OpenStreetMap Based on FP-Growth and Improved Markov Process.- Data
Processing and Development of Big Data System: A Survey.- Current PHM Surveys
for Mechanical Engineering.- Multi-sensor Fusion Detection Method for Vehicle
Target Based on Kalman Filter and Data Association Filter.-Research on Crop
Growth Period Estimation Based on Fusion Features.- Research and Application
of Holographic Portrait Label System Construction for Main Equipment of
Distribution Network Based on Big Data.- An Empirical Study on the Tourism
Image of Nanjing From the Perspective of International Students.- Anomaly
detection based on isolated forests.- An Information Identification Method
for Venture Firms based on Frequent Itemset Discovery.- Design of Abnormal
Behavior Detection System in the State Grid Business Office.- Research on the
Application of Intelligent Detection Technology in Business Hall System.-
Study on  Freshness Indicator Agent of Natural Plant Pigment.-
Multi-dimensional Visualization and Simulation Analysis of COVID-19
Outbreak.- Enterprise Electricity Consumption Forecasting Method Based on
Federated Learning.- Cloud Computing and Security.-  Revisit Raft Consistency
Protocol on Private Blockchain System in High Network Latency.-
Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud
Computing.- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption
Scheme for Secure Cloud Data Sharing.- Identity Authentication Technology in
Edge Computing Environment: Vision and Challenges.- Research on Security
Mechanism and Forensics of SQLite Database.- Research On Software Defined
Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes.-
Boolean functions with a few Walsh transform values.- Research on Automation
Strategy of Coq.- A Model Design of Cost-effificient Blockchain Framework for
E-Government Application.- Offloading Method Based on Reinforcement Learning
in Mobile Edge Computing.- A Dynamic Decision-making Method for Endorser Node
Selection.- A Proxy Node Resource Load Balancing Strategy Based on the Swift
System.- Research on the Picture Database of Minority Emotion.- Instant
Messaging Application Traffic Recognition.