Atjaunināt sīkdatņu piekrišanu

E-grāmata: New Trends in Computer Technologies and Applications: 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022, which took place in Taoyuan, Taiwan, in December 2022. ICS is one of the largest joint international IT symposia held in Taiwan. Founded in 1973, it is intended to provide a forum for researchers, educators, and professionals to exchange their discoveries and practices, and to explore future trends and applications in computer technologies. The biannual symposium offers a great opportunity to share research experiences and to discuss potential new trends in the IT industry.

The 58 full papers and one invited paper presented in this volume were carefully reviewed and selected from 137 submissions. The papers have been organized in the following topical sections: Invited Paper; Algorithms, Bioinformatics, and Computation Theory; Cloud Computing and Big Data; Computer Vision and Image Processing; Cryptography and Information Security; Electronics and Information Technology; Mobile Computation and Wireless Communication; Ubiquitous Cybersecurity and Forensics.
Invited Paper.- High-Radix Interconnection Networks. -Algorithms,
Bioinformatics, and Computation Theory.- String editing under pattern
constraints.- Priority Algorithms with Advice for Disjoint Path Allocation
Problems (Extended Abstract).- On Two Variants of Induced Matchings.- A tree
structure for local diagnosis in multiprocessor systems under comparison
model.- Multiagent Learning for Competitive Opinion Optimization
(Extended Abstract).- The Maximum Zero-Sum Partition Problem.- Combined
Bayesian and RNN-based Hyperparameter Optimization for Efficient Model
Selection Applied for autoML.- Adiabatic Quantum Computation for Cyber Attack
and Defense Strategies.- Computation Offloading Algorithm Based on Deep
Reinforcement Learning and Multi-Task Dependency for Edge Computing.- A
Comparison Diagnosis Algorithm for Conditional Fault Local Diagnosis of
Multiprocessor Systems.- Novel ways of enumerating restrained dominating sets
of cycles.- Fault Diagnosability of Multigraph Matching Composition
Networks.- Generating Scale-Free Outerplanar Networks.- Hamiltonian
Properties of the Dragonfly Network.- Fine Grained Space Complexity and the
Linear Space Hypothesis (Preliminary Report).- Partition-Edge Fault-Tolerant
Hamiltonicity of Pancake Graphs.- Cloud Computing and Big Data.- Query
Regrouping Problem on Tree Structure for GPUs Accelerated Platform.- The
Enhancement of Classification of Imbalanced Dataset for
Edge Computing.- Development of Personnel Epidemic Prevention Monitoring
Access Control System.- The Use of Serverless Processing in Web Application
Development.- Scaling Model for vIMS on the Cloud.- Using classification
algorithms to predict Taiwan Stock Market - A Case study of Taiwan Index
Futures.- Semi-Automatic Chatbot Generation for Web APIs.- Prediction
ofMiddle-Aged Unhealthy Facial Skin using VGG19 and Support Vector Machine
Models.- Computer Vision and Image Processing.- Real-Time Intentional Eye
Blink Detection Using Rhombus Identification.- Difficulty-Aware Mixup for
Replay-based Continual Learning.- Vision-Based Lightweight Facial Respiration
and Heart Rate Measurement Technology.- GAN-based Criminal Suspect Face
Generator.- Cryptography and Information Security.- Automatic Summarization
of Critial Threat Intelligence Using Transfer Learning.- Anti-screenshot
Watermarking Algorithm about Archives Image Based on Deep Learning
Model.- Detecting Android malware by combining system call
sequencerelationships with local feature calculation.- A Detector Using
Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious
JavaScript with Obfuscations.- A Lightweight and Robust Authentication and
Key Agreements with PhysicallyUnclonable Function in Manufacturing
Environments.- Image compression and meaningful ciphertext encryption based
on improved infinite collapse 2D hyperchaos and histogram shift embedding.- A
Robust Two Factor Authentication Scheme with Fine Grained Biometrics
Verification.- Electronics and Information Technology.- Applying an IoT
Analytics Framework in East Asia Area.- Android Malware Classifier Combining
Permissions and API Features to face model drifting.- Design and
Implementation of the Optimized Computing Architecture for Matrix
Decomposition Algorithms.- Design and Implememtation of The CNN Accelator
Based on Multi-streaming SIMD Mechanisms.- Design and Implementation of The
Link-list DMA Controller for High Bandwidth Data Streaming.- STEM Education
Meets HPC.- Research on KNN-based GNSS Coordinate Classification for
Epidemic Management.- An Improved Light Weight Countermeasure Scheme to
Efficiently Mitigate TCP Attacks in SDN.- The Effectiveness of Block-based
Visualized Programming Learning on the problem-solving skills of the
Freshmen.- Behavior Profiling of Role-Playing Game Players Based on
Heuristic Event Log Mining.- The impact of live streaming on personal
purchase behavior.- Stochastic-Gradient-Descent-Based Max-Margin Early Event
Detector.- AHP-based Assessment of Developing Online Virtual Reality
Services with Progressive Web Apps.- From Data of Internet of Things to
Domain Knowledge: A Case Study of Exploration in Smart Agriculture.- Physical
Layer Coding and Cryptanalysis for The Security Communications.- Mobile
Computation and Wireless Communication.- 5G Network Slice Scalability based
on Management Data Analytics Function (MDAF).- Design and Analysis for
Wireless Tire Pressure Sensing System.- Ubiquitous Cybersecurity and
Forensics.- Preserving Collusion-free and Traceability in Car-sharing System
based on Blockchain.- Utilization of Theoretical Domains Framework (TDF) to
Validate the Digital Piracy Behaviour Constructs A systematic Literature
Review Study.- Domain-specific Anomaly Detection for In-vehicle
Networks.- LED: Learnable Encryption with Deniability.- Module Architecture
of Docker Image and Container Security.- High-Capacity Double-Layer Data
Hiding Technique Based on 3D Magic Cube.