Atjaunināt sīkdatņu piekrišanu

E-grāmata: Social Computing: Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016, Harbin, China, August 20-22, 2016, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This two volume set (CCIS 623 and 634) constitutes the refereed proceedings of the Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016, held in Harbin, China, in August 2016.
The 91 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers are organized in topical sections on Research Track (Part I) and Education Track, Industry Track, and Demo Track (Part II) and cover a wide range of topics related to intelligent computation in Big Data era, such as artificial intelligence, machine learning, algorithms, natural language processing, image processing, MapReduce, social network.
Research Track
A Context-Aware Model Using Distributed Representations for Chinese Zero Pronoun Resolution
3(9)
Bingbing Wu
Tiejun Zhao
A Hierarchical Learning Framework for Steganalysis of JPEG Images
12(12)
Baojun Qi
A Multi-agent Organization Approach for Developing Social-Technical Software of Autonomous Robots
24(15)
Sen Yang
Xinjun Mao
Yin Chen
Shuo Yang
A Novel Approach for the Identification of Morphological Features from Low Quality Images
39(9)
Weiqiang Xia
Zhijun Hu
Huijuan Zhai
Man Kang
Jingqun Song
Guanglu Sun
A Novel Filtering Method for Infrared Image
48(8)
Jian Kang
Chunxiao Zhou
Weiqiang Xia
Chaopeng Shen
Guanglu Sun
A Novel Quantum Noise Image Preparation Method
56(7)
Xianhua Song
A Personalized Recommendation Algorithm with User Trust in Social Network
63(14)
Yuxin Dong
Chunhui Zhao
Weijie Cheng
Liang Li
Lin Liu
A Preprocessing Method for Gait Recognition
77(10)
Hong Shao
Yiyun Wang
Yang Wang
Weihao Hu
A Real-Time Fraud Detection Algorithm Based on Usage Amount Forecast
87(9)
Kun Niu
Zhipeng Gao
Kaile Xiao
Nanjie Deng
Haizhen Jiao
A Self-determined Evaluation Method for Science Popularization Based on IOWA Operator and Particle Swarm Optimization
96(13)
Tianlei Zang
Yan Wang
Zhengyou He
Qingquan Qian
A Strategy for Small Files Processing in HDFS
109(11)
Zhenshan Bao
Shikun Xu
Wenbo Zhang
Juncheng Chen
Jianli Liu
A SVM-Based Feature Extraction for Face Recognition
120(7)
Peng Cui
Tian-tian Yan
A Transductive Support Vector Machine Algorithm Based on Ant Colony Optimization
127(9)
Xu Yu
Chun-nian Ren
Yan-ping Zhou
Yong Wang
ABR: An Optimized Buffer Replacement Algorithm for Flash Storage Devices
136(15)
Xian Tang
Na Li
Qiang Ma
An Approach for Automatically Generating R2RML-Based Direct Mapping from Relational Databases
151(19)
Mohamed A.G. Hazber
Ruixuan Li
Guandong Xu
Khaled M. Alalayah
An Improved Asymmetric Bagging Relevance Feedback Strategy for Medical Image Retrieval
170(12)
Sheng-sheng Wang
Yan-ning Shao
An Incremental Graph Pattern Matching Based Dynamic Cold-Start Recommendation Method
182(14)
Yanan Zhang
Guisheng Yin
Qiushi Zhao
An Optimized Load Balancing Algorithm of Dynamic Feedback Based on Stimulated Annealing
196(10)
Zhang Huyin
Wang Kan
App Store Analysis: Using Regression Model for App Downloads Prediction
206(15)
Shanshan Wang
Wenjun Wu
Xuan Zhou
Application Progress of Signal Clustering Algorithm
221(7)
Chujie Deng
Jing Qi
Mei Li
Xuanchicheng Luo
Automated Artery-Vein Classification in Fundus Color Images
228(10)
Yi Yang
Wei Bu
Kuanquan Wang
Yalin Zheng
Xiangqian Wu
Character Variable Numeralization Based on Dimension Expanding and its Application on Text Classification
238(11)
Li-xun Xu
Xu Yu
Yong Wang
Yun-xia Feng
Clarity Corresponding to Contrast in Visual Cryptography
249(9)
Xuehu Yan
Yuliang Lu
Hui Huang
Lintao Liu
Song Wan
CoGrec: A Community-Oriented Group Recommendation Framework
258(14)
Yu Liu
Bai Wang
Bin Wu
Xuelin Zeng
Jing Shi
Yunlei Zhang
CTS: Combine Temporal Influence and Spatial Influence for Time-Aware POI Recommendation
272(15)
Hanbing Zhang
Yan Yang
Zhaogong Zhang
Improvement for LEACH Algorithm in Wireless Sensor Network
287(12)
Shiying Xia
Minsheng Tan
Zhiguo Zhao
Ting Xiang
Decentralizing Volunteer Computing Coordination
299(15)
Wei Li
Eugenie Franzinelli
Design and Implementation of Chinese Historical Text Mining System Based on Culturomics
314(12)
Lin Tang
Chonghui Guo
Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH
326(9)
Mahmoud Emam
Qi Han
Hongli Zhang
Determining Web Data Currency Based on Markov Logic Network
335(15)
Yan Zhang
Rui Zhang
Efficient File Accessing Techniques on Hadoop Distributed File Systems
350(12)
Wei Qu
Siyao Cheng
Hongzhi Wang
Expanding Corpora for Chinese Polarity Classification via Opinion Paraphrase Generation
362(12)
Da Pan
Jiaying Song
Guohong Fu
Feature Extraction for Effective Content-Based Cloth Image Retrieval in E-Commerce
374(10)
Lingli Li
JinBao Li
Fundus Lesion Detection Based on Visual Attention Model
384(11)
Baisheng Dai
Wei Bu
Kuanquan Wang
Xiangqian Wu
Identifying Transportation Modes from Raw GPS Data
395(15)
Qiuhui Zhu
Min Zhu
Mingzhao Li
Min Fu
Zhibiao Huang
Qihong Gan
Zhenghao Zhou
Image Segmentation: A Novel Cluster Ensemble Algorithm
410(8)
Lei Wang
Guoyin Zhang
Chen Liu
Wei Gao
Influence Maximization for Cascade Model with Diffusion Decay in Social Networks
418(10)
Zhijian Zhang
Hong Wu
Kun Yue
Jin Li
Weiyi Liu
Link Mining in Online Social Networks with Directed Negative Relationships
428(13)
Baofang Hu
Hong Wang
Lossless and High Robust Watermarking of Electronic Chart for Copyright Protection
441(12)
Jianguo Sun
Junyu Lin
Liguo Zhang
Shouzheng Liu
Qian Zhao
Chao Liu
Kou Liang
MapReduce for Big Data Analysis: Benefits, Limitations and Extensions
453(5)
Yang Song
Hongzhi Wang
Jianzhong Li
Hong Gao
Measurement of Nodes Importance for Complex Networks Structural-Holes-Oriented
458(12)
Hui Xu
Jianpei Zhang
Jing Yang
Lijun Lun
Method of Consistency Judgment for App Software's User Comments
470(14)
Meng Ran
Ying Jiang
Qixin Xiang
Jiaman Ding
Haitao Wang
Multi-GPU Based Recurrent Neural Network Language Model Training
484(10)
Xiaoci Zhang
Naijie Gu
Hong Ye
Negation Scope Detection with Recurrent Neural Networks Models in Review Texts
494(15)
Lydia Lazib
Yanyan Zhao
Bing Qin
Ting Liu
Numerical Stability of the Runge-Kutta Methods for Equations u'(t) = au(t) + bu(K/N t) in Science Computation
509(11)
Yingchun Song
Xianhua Song
Optimization Analysis of Hadoop
520(13)
Jinglun Li
Shengfei Shi
Hongzhi Wang
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits
533(13)
Fei Chen
Yiliang Han
Di Jiang
Xiaoce Li
Xiaoyuan Yang
Projecting Distortion Calibration and Evaluation of Coding Fringes in Structured Light System
546(10)
Haibin Wu
Qing Xu
Xi Wu
Guanglu Sun
Xiaoyang Yu
Xiaoming Sun
Recognizing Visual Attention Allocation Patterns Using Gaze Behaviors
556(12)
Cheng Wu
Feng Xie
Changsheng Yan
Research of Constructing 3D Digital River Based on ArcEngine and SketchUp
568(9)
Xueyan Tang
Yuansheng Lou
Feng Ye
Xiaorong Yan
Research of the DBN Algorithm Based on Multi-innovation Theory and Application of Social Computing
577(14)
Pinle Qin
Meng Li
Qiguang Miao
Chuanpeng Li
Research on Feature Fusion Technology of Fruit and Vegetable Image Recognition Based on SVM
591(9)
Yanqing Wang
Yipu Wang
Chaoxia Shi
Hui Shi
Selecting Seeds for Competitive Influence Spread Maximization in Social Networks
600(12)
Hong Wu
Weiyi Liu
Kun Yue
Jin Li
Weipeng Huang
Sentence-Level Paraphrasing for Machine Translation System Combination
612(9)
Junguo Zhu
Muyun Yang
Sheng Li
Tiejun Zhao
Social Computing in Open Source Community: A Study of Software Reuse
621(11)
Mengwen Chen
Tao Wang
Cheng Yang
Qiang Fan
Gang Yin
Huaimin Wang
Specific Data Mining Model of Massive Health Data
632(9)
Cuixia Li
Shuyan Zhang
Dingbiao Wang
Specular Detection and Removal for a Grayscale Image Based on the Markov Random Field
641(9)
Fang Yin
Tiantian Chen
Rui Wu
Ziru Fu
Xiaoyang Yu
Teaching Reformation and Practice of ".NET Program Design" Course Oriented CDIO Model
650(7)
RuiGai Li
Achuan Wang
The Framework Design of Intelligent Checkers
657(11)
Biao Wang
Lijuan Jia
He Quan
Changsong Zheng
The Software Behavior Trend Prediction Based on HMM-ACO
668(10)
Ziying Zhang
Dong Xu
Xin Liu
Towards Realizing Sign Language-to-Speech Conversion by Combining Deep Learning and Statistical Parametric Speech Synthesis
678(13)
Xiaochun An
Hongwu Yang
Zhenye Gan
Understand the Customer Preference of Different Market Segments from Online Word of Mouth: Evidence from the China Auto Industry
691(12)
Xudong Liu
Lina Zhou
Jinquan Gong
Using Gaussian Mixture Model to Fix Errors in SFS Approach Based on Propagation
703(10)
Wenmin Huang
Jiquan Ma
Enbin Zhang
Author Index 713