ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, ... in Computer and Information Science, 1587) Part II

دانلود کتاب پیشرفت در هوش مصنوعی و امنیت: هشتمین کنفرانس بین المللی هوش مصنوعی و امنیت، ICAIS 2022، چینگهای، چین، ... در علوم کامپیوتر و اطلاعات، 1587) قسمت دوم

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, ... in Computer and Information Science, 1587) Part II

مشخصات کتاب

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, ... in Computer and Information Science, 1587) Part II

ویرایش: [1st ed. 2022] 
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 3031067606, 9783031067600 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 740
[732] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 55 Mb 

قیمت کتاب (تومان) : 43,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, ... in Computer and Information Science, 1587) Part II به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت در هوش مصنوعی و امنیت: هشتمین کنفرانس بین المللی هوش مصنوعی و امنیت، ICAIS 2022، چینگهای، چین، ... در علوم کامپیوتر و اطلاعات، 1587) قسمت دوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت در هوش مصنوعی و امنیت: هشتمین کنفرانس بین المللی هوش مصنوعی و امنیت، ICAIS 2022، چینگهای، چین، ... در علوم کامپیوتر و اطلاعات، 1587) قسمت دوم

مجموعه 3 جلدی CCIS 1586، CCIS 1587 و CCIS 1588 مجموعه مقالات داوری هشتمین کنفرانس بین المللی هوش مصنوعی و امنیت، ICAIS 2022 است که در ژوئیه 2022 در چینگهای، چین برگزار شد. 

مجموع 115 مقاله کامل و 53 مقاله کوتاه ارائه شده در این مجموعه مقالات 3 جلدی به دقت بررسی و از بین 1124 مقاله ارسالی انتخاب شد. مقالات در بخش های موضوعی به شرح زیر سازماندهی شدند:

بخش اول: هوش مصنوعی؛

بخش دوم: هوش مصنوعی؛ اطلاعات بزرگ؛ رایانش ابری و امنیت؛ پزشکی قانونی چند رسانه ای؛

بخش سوم: رمزگذاری و امنیت سایبری. پنهان کردن اطلاعات؛ امنیت اینترنت اشیا


توضیحاتی درمورد کتاب به خارجی

The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. 

The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows:

Part I: artificial intelligence;

Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics;

Part III: encryption and cybersecurity; information hiding; IoT security. 



فهرست مطالب

Preface
Organization
Contents – Part II
Artificial Intelligence
Crowd Anomaly Detection in Surveillance Video
	Abstract
	1 Introduction
	2 Background Modeling
		2.1 Frame Difference
		2.2 ViBe Background Modeling
		2.3 Mixed Gaussian Background Modeling
	3 Fall Detection Based on Human Morphological Features and HOG Features
		3.1 SVM Classifier
		3.2 Fall Detection Combined with SVM and HOG Features
	4 Experiment Analysis
	5 Conclusion
	References
Improved Regularization of Convolutional Neural Networks with Point Mask
	Abstract
	1 Introduction
	2 Motivation
	3 Related Work
		3.1 Data Augmentation
		3.2 Denoising Autoencoders and Context Encoders
		3.3 Edge Detection and Corner Detection
	4 Our Approach
		4.1 Point Mask
		4.2 Corner Detection
	5 Experiments
		5.1 Image Classification
		5.2 Ablation Study
	6 Discussion
	References
Research on Crack Detection Technology of Buildings After Earthquake Based on Structured Light
	Abstract
	1 Introduction
	2 Sine Grating Fringe Pattern Acquisition
	3 Crack Detection of Buildings After Earthquake Based on Structural Light
		3.1 Phase Unwrapping Based on Four-Step Phase Shift Method and Multi-frequency Heterodyne Algorithm
		3.2 Image Mosaic Based on ICP Algorithm
		3.3 Crack Detection of Buildings Based on Height Difference
	4 Experimental Results and Analysis
		4.1 Results of Crack Phase Unwrapping After Earthquake
		4.2 Results of Crack Image Mosaic After Earthquake
		4.3 Crack Detection of Buildings After Earthquake
	5 Conclusion
	Funding Statement
	References
Group-Attention Transformer for Fine-Grained Image Recognition
	1 Introduction
	2 Related Works
		2.1 Convolutional Neural Network
		2.2 Transformer
	3 Approach
		3.1 Vision Transformer for Image Recognition
		3.2 Proposed Network Architecture
	4 Experiments
		4.1 Experiments Setup
		4.2 Comparison with the SOTA
		4.3 Ablation Experiments
		4.4 Visualization Analysis
	5 Conclusion
	References
GCN-Based Text Classification Research
	Abstract
	1 Introduction
		1.1 Research Background
		1.2 Research Status
	2 Related Technologies
		2.1 Neural Network Model
		2.2 Convolutional Neural Networks
	3 Graph Convolutional Neural Network
		3.1 Fourier Transform of Graph Information
		3.2 Graph Convolution Operations
		3.3 The Applications of GCN
	4 GCN-Based Text Classification Model
		4.1 Construct Doc-Word Relationship Graph
		4.2 TextGCN Model Training
	5 Experimental Results and Analysis
		5.1 Preparation of the Experiment
		5.2 Procedure of the Experiment
		5.3 Experimental Results
		5.4 Experimental Analysis
	References
A Text Multi-label Classification Scheme Based on Resampling and Ensemble Learning
	Abstract
	1 Introduction
	2 The Imbalance of the Types of Legal Documents for Medical Disputes
	3 Multi-label Classification Based on Resampling and Ensemble Learning
		3.1 Resampling Algorithm Based on the Average Sparsity of the Label Set
		3.2 Multi-label Classification Algorithm Based on Ensemble Learning
	4 Experimental Results and Analysis
		4.1 Data Set
		4.2 Experimental Results and Analysis
	5 Summary
	Acknowledgement
	References
Review of Few-Shot Learning in the Text Domain and the Image Domain
	Abstract
	1 Introduction
	2 The Prior Knowledge from {{{\varvec D}}}_{{{\varvec l}}{{\varvec a}}{{\varvec b}}{{\varvec e}}{{\varvec l}}}
		2.1 Data Augmentation
		2.2 Refining Existing Parameters
	3 The Prior Knowledge from D_{unlabel}
	4 The Prior Knowledge from Similar Data Sets
		4.1 Data Augmentation
		4.2 Multitask Learning
		4.3 Embedding Learning
		4.4 Refining Existing Parameters
	5 Data Sets
	6 Conclusion
	References
A Fire Detection System Based on YOLOv4
	1 Introduction
	2 Object Detection and Deep Learning
		2.1 Introduction to Object Detection
		2.2 Convolutional Neural Networks
	3 YOLO Object Detection Algorithm
		3.1 CSPdarknet-53
		3.2 Spatial Pyramid Pooling (SPP)
		3.3 PANet
		3.4 Loss Function
	4 Analysis of Experiment Results
		4.1 Datasets and Experimental Platforms
		4.2 Training Parameter Setting
		4.3 System Structure
	5 Conclusion
	References
Research on Application of Artificial Intelligence Technology in Education
	Abstract
	1 Introduction
	2 Meaning of Artificial Intelligence
	3 The Relationship Between Artificial Intelligence and Education and Teaching
	4 Status Quo of the Application of Artificial Intelligence Technology in Education
		4.1 Artificial Intelligence Education Professional Technical Personnel Training Ability is Weak
		4.2 Artificial Intelligence Education is Difficult to Break Through the Technical Bottleneck
		4.3 Artificial Intelligence Education Products Are not Perfect and It is Urgent to Innovate and Expand
		4.4 Artificial Intelligence Education Big Data Platform Has Not Yet Been Built
		4.5 Artificial Intelligence Education May Cause Ethical Risks
	5 Application of Artificial Intelligence Technology in Education and Teaching
		5.1 Artificial Intelligence Technology Can Be Used for Intelligent Teaching
		5.2 Artificial Intelligence Technology Can Be Used for Intelligent Semantic Recognition
		5.3 Artificial Intelligence Technology Can Be Used for Intelligent Evaluation
		5.4 Artificial Intelligence Technology Can Be Used for Intelligent Learning Guidance
	6 The Significance of Application of Artificial Intelligence Technology in Education and Teaching
		6.1 Artificial Intelligence Can Optimize Teaching Tools and Resources for School Education
		6.2 Artificial Intelligence Creates an Intelligent Teaching Environment for School Education
		6.3 Artificial Intelligence Promotes the Innovative Development of School Teaching Evaluation and Teaching Management
	7 Practical Dilemma of Artificial Intelligence Application in School Education and Teaching
		7.1 The Immaturity of Technology Limits the Promotion of Artificial Intelligence in School Education and Teaching
		7.2 Lack of Big Data Limits the Application of Artificial Intelligence in School Education and Teaching
		7.3 The Shortage of Talents Restricts the Development of Artificial Intelligence in School Education and Teaching
	8 Breakthrough Path of Artificial Intelligence Application in School Education and Teaching
		8.1 Optimize Curriculum Design and Reconstruct Artificial Intelligence Education Curriculum System
		8.2 Change the Role of Teachers and Cultivate Service-Oriented Intelligent Teachers
		8.3 Expand Education Data and Use Artificial Intelligence to Assist School Teaching Management
		8.4 To Return to the Essence of Education, the Construction of Smart Campus Should Be People-Oriented
	9 Conclusion
	References
A Data-Driven Machine Learning Spectrum Sharing Mechanism
	Abstract
	1 Introduction
	2 Theoretical Basis
		2.1 Spectrum Sharing Mechanism Based on Q-learning
		2.2 Spectrum Sharing Mechanism Based on ARIMA
		2.3 Autoregression Model
		2.4 Moving Average Model
		2.5 Differential Integration Moving Average Autoregressive Model
	3 Data-Driven Machine Learning Spectrum Sharing Mechanism
		3.1 LSTM Model
		3.2 Merge Input Sequences
		3.3 Attention Mechanism
		3.4 Feedback Recording and Retraining
	4 Experiment and Result Analysis
		4.1 Specific Structure and Parameter Selection
		4.2 Detection Effect of Spectrum Behavior
	5 Conclusion
	References
Tri-modal Quadruple Constraint Network for Visible-Infrared Person Re-identification
	Abstract
	1 Introduction
	2 Proposed Method
		2.1 Framework
		2.2 Tri-modal Input
		2.3 Loss Function
	3 Experiment
		3.1 Datasets
		3.2 Experimental Settings
		3.3 Ablation Experiment
		3.4 Comparison with State-of-the-art Methods
	4 Conclusion
	Acknowledgement
	References
Continuous Weighted Neural Cognitive Diagnosis Method for Online Education
	Abstract
	1 Introduction
	2 Related Work
		2.1 Cognitive Diagnosis
		2.2 Neural Cognitive Diagnosis Framework
	3 Continuous Weighted Neural Cognitive Diagnosis Model
		3.1 Task Overview
		3.2 Neural Cognitive Diagnosis Model
	4 Experiments
		4.1 Dataset Description
		4.2 Experimental Setup
		4.3 Experimental Results
		4.4 Discussion
	5 Conclusion
	References
User-Oriented Data and Model Privacy Protection Technology
	Abstract
	1 Introduction
	2 Intelligent Algorithm-Oriented Homomorphic Encryption for Data Privacy Protection
		2.1 Background
		2.2 Homomorphic Cryptographic Privacy Protection System for Intelligent Algorithms
		2.3 Implementation Principles
		2.4 Experimental Evaluation
	3 Efficient Model Privacy Protection Function Based on Blowfish Cryptographic Algorithm
		3.1 Lightweight Encryption and Decryption of User Model Data Based on Blowfish
		3.2 Principle of Optimized Lightweight Blowfish Algorithm
		3.3 Performance Comparison Between Blowfish Algorithm and Other Algorithms
	4 Conclusion
	References
DICDP: Deep Incomplete Clustering with Distribution Preserving
	1 Introduction
	2 Related Work
		2.1 Statistical Imputation
		2.2 Deep Incomplete Clustering
		2.3 Deep Incomplete Clustering
	3 DICDP
		3.1 Motivation
		3.2 Overall Network Architecture
	4 Experiments
		4.1 Experiments Setup
		4.2 Compared SOTA Methods
		4.3 Results Comparisons to Alternative Methods
		4.4 Ablation Study
	5 Conclusion
	References
A Review of Client Scheduling Strategies in Federated Learning
	Abstract
	1 Introduction
	2 A Brief Introduction of Federated Learning
		2.1 Definition and Characteristics of FL
		2.2 FL’s Infrastructure and Classification
		2.3 Challenges of FL
	3 FL Clients Scheduling Strategies
		3.1 Client Management Architecture Design
		3.2 Client Sampling
	4 Conclusions and Prospects
	Conflicts of Interest
	References
Error Sensitivity Based Redundancy Analysis for Kinematic Calibration of Industrial Robot
	Abstract
	1 Introduction
	2 Overview of Industrial Robot Calibration System
	3 Pose Error Model Based on M-DH Model
	4 Redundancy Analysis of Pose Error Model
	5 Robot Calibration Experiment Based on Non-redundant Error Model
	6 Conclusion
	Conflicts of Interest
	References
Re-introduction to Tibetan Case Structure and Its Grammatical Functions
	Abstract
	1 Introduction
	2 Structural Features of Tibetan Sentences
	3 Case Structure in Tibetan
		3.1 Form of Case Structure
		3.2 The Classification of Tibetan Verbs and Semantic Case Priority
		3.3 Nested Structure in Sentence
		3.4 Case Structure Serving as the Most Direct Unit of Tibetan Sentences
	4 Terms Tree Diagram of Tibetan Case Grammar
		4.1 Fillmore Case Grammar
		4.2 Tibetan Tree Diagram Based on Case Grammar
	5 Conclusion
	Acknowledgement
	References
Modelling the Precipitation Nowcasting ZR Relationship Based on Deep Learning
	Abstract
	1 Introduction
	2 Related Work
		2.1 Traditional Methods
		2.2 SMOTE for Data Processing
	3 ShengZheng Dataset
	4 Case Design and Algorithms
		4.1 CNN + FC + ZR Formula
		4.2 CNN + FC
		4.3 CNN + LSTM + FC
		4.4 CNN + LSTM + ZR Formula + FC
		4.5 CNN + Transformer + FC
		4.6 CNN + Transformer + FC + SMOTE
		4.7 CNN + Transformer + FC + Customized Loss Function
	5 Evaluation and Discussion
	6 Evaluation and Discussion
	References
Multi-task Parallel: A Tumor Segmentation Approach of Specific Task Attention
	Abstract
	1 Introduction
	2 Related Work
		2.1 Multi-task Learning
		2.2 Attention of Specifical Task
	3 Methodology
		3.1 Multi-task Similarity Measurement Learning
		3.2 Task-Specific Attention Mechanism
		3.3 Loss Metrics
	4 Experiments and Results
		4.1 Dataset and Pre-processing
		4.2 Training Details
		4.3 Evaluation Metrics
		4.4 Results
	5 Discussion and Conclusion
	Acknowledgement
	References
The Optimization Method of the Layout of Integrated Passenger Transport Terminals in Beijing-Tianjin- Hebei Urban Agglomeration
	Abstract
	1 Introduction
	2 Establish a Selection Model of Alternative Points Based on the Degree of Charm of Hubs
		2.1 Select and Define the Degree of Charm Index
		2.2 Calculate the Degree of Charm
	3 Layout of Optimization Based on P-Median Location Model
		3.1 Description of Problem
		3.2 Model Assumptions
		3.3 Symbol Description
		3.4 Model Construction
		3.5 Model Solution
	4 Example Verification
		4.1 Select the Target Research Area
		4.2 Model Solving
		4.3 Result Analysis
	5 Conclusion
	Acknowledgement
	References
Review of Research on Named Entity Recognition
	Abstract
	1 Introduction
		1.1 The Current Research Framework
		1.2 What Are Named Entities
		1.3 Research History
		1.4 Evaluation Conferences
	2 NER Methods
		2.1 Rules and Dictionaries-Based Methods
		2.2 Machine Learning-Based Methods
		2.3 Hybrid Method
	3 New Stage of NER
		3.1 Specific Application
		3.2 NER Method Research
	4 Conclusion
	Acknowledgement
	References
Big Data
Large-Scale Mobile Edge Computing with Joint Offloading Decision and Resource Allocation
	1 Introduction
	2 System Model
		2.1 Local Execution
		2.2 Remote Execution
	3 Problem Formulation
		3.1 Optimization Problem
		3.2 Equivalent Problem
	4 Joint Resource Allocation and Offloading Decision Algorithm
		4.1 Uplink Power Allocation Algorithm
		4.2 Computing Resource Allocation Algorithm
		4.3 Offloading Decision Algorithm
	5 Simulation and Analysis
	6 Conclusion
	References
Tibetan Literature Recommendation Based on Vague Similarity of Cited Number and Downloads
	Abstract
	1 Introduction
		1.1 A Subsection Sample
	2 Keyword Sorting
	3 Turn to Fuzzy Membership
	4 The Fuzzy Membership Degree is Transformed into Vague Function Value
	5 Recommended Ranking
	6 Experiment
		6.1 Data Sources
		6.2 Experimental Process
		6.3 Keyword Sorting of Recommendation Set
		6.4 Keywords Fuzzy Membership Degree and Vague Function Value
		6.5 Using Vague Similarity Recommendation
		6.6 Fuse the Vague Similarity of the Number of Arguments and the Number of Downloads
	7 Conclusion
	Acknowledgements
	References
Design of Provincial Comprehensive Energy Service Platform Based on SCADA
	Abstract
	1 Introduction
		1.1 Background
		1.2 Research Purpose and Significance
		1.3 Research Content
	2 Demand Analysis
		2.1 Feasibility Analysis
		2.2 Functional Requirements Analysis
	3 Platform Design and Implementation
		3.1 The Overall Design of the System
		3.2 Application Architecture Design
		3.3 Data Architecture Design
	4 Conclusion
	References
Research on Process Oriented Emergency Management and Control Model Under the Background of Big Data
	Abstract
	1 Introduction
	2 Construction of Process Oriented Emergency Management and Control Model
		2.1 Analysis of Process Characteristics of Emergencies
		2.2 Emergency Management Model Construction
	3 Key Issues and Implementation Strategies of Emergency Management and Control Model
		3.1 Multi-source Data Fusion
		3.2 The Co-governance of Multiple Subjects
		3.3 Construction of Intelligent Case Base
	4 Conclusion
	References
Analysis of Factors Influencing Carbon Emissions from Civil Aviation Transportation Based on LMDI and STIRPAT Models
	Abstract
	1 Introduction
	2 Introduction
		2.1 A Subsection Sample
		2.2 The Kaya Constant and the LMDI Model
		2.3 STIRPAT Model
		2.4 Data Sources
	3 Decomposition of Carbon Emission Influencing Factors Based on LMDI Model
	4 Analysis of the Factors Influencing Carbon Emissions Based on the STIRPAT Model
	5 Conclusions and Recommendations
		5.1 Analysis of the Results of Factors Influencing Carbon Emissions from Civil Aviation Transport
		5.2 Suggestions for Energy Saving and Emission Reduction in the Civil Aviation Transport Industry
	References
Design and Implementation of Hadoop-Based Campus Cloud Drive
	Abstract
	1 Analysis of Campus Network Cloud Disk System
		1.1 Automatic Data Backup
		1.2 Build a Teaching Resource Bank and Improve the Level of Education
		1.3 Cloud Electronic Classroom, Orderly Submission of Homework
	2 Design of Overall System
	3 System Design and Implementation
		3.1 User Authentication Login Process
		3.2 Data Transmission
		3.3 File Upload and Management
		3.4 File Download
		3.5 File Sharing
		3.6 Storage of Documents
	4 System Coding and Testing
	5 Operating Environment and Installation Deployment
	6 Summary
	Funding Statement
	References
Correlation Analysis of Water Temperature and Dissolved Oxygen Based on Water Quality Monitoring Data
	Abstract
	1 Introduction
	2 Related Technology
		2.1 Web Crawler
		2.2 Introduction to Pandas
	3 Data Preprocessing
		3.1 Construction of Big Data for Water Quality Monitoring
		3.2 Data Preprocessing
		3.3 Data Transformation
	4 Correlation Analysis
		4.1 Principles of Correlation Analysis
		4.2 Visual Analysis
		4.3 Regression Analysis
		4.4 Correlation Prediction
	5 Summary
	Acknowledgement
	References
A Database File Storage Optimization Strategy Based on High-Relevance Mode Access Data Compression
	1 Introduction
	2 Data Compression
	3 Experiment
		3.1 Experimental Configuration
		3.2 Experimental Results and Analysis
	4 Conclusion
	References
Efficient Designated-Server Proxy Re-encryption with Keyword Search for Big Data
	1 Introduction
	2 Related Works
		2.1 Keyword Guessing Attack
		2.2 Proxy Re-encryption with Keyword Search
		2.3 Our Contribution
	3 Preliminaries
		3.1 Bilinear Pairing
		3.2 Difficult Problem Assumptions
		3.3 System Model
		3.4 Security Model
	4 Concrete Structure of the Proposed Scheme
		4.1 The Algorithm Structure
		4.2 Correctness of the Scheme
	5 Security and Performance Analysis
		5.1 Security Proof
		5.2 Performance Analysis
	6 Conclusion
	References
HotLT: LT Code-Based Secure and Reliable Consortium Blockchain Storage Systems
	Abstract
	1 Introduction
	2 Related Work
	3 Background and Motivation
		3.1 LT Codes
		3.2 Consortium Blockchains
		3.3 Motivation
	4 Design of HotLT
		4.1 HotLT System Architecture
		4.2 Dynamic Decoding Strategy
		4.3 Repair Strategy Based on Data Hot Perception
	5 Evaluation
	6 Conclusion
	Acknowledgements
	References
Research on Key Word Information Retrieval Based on Inverted Index
	Abstract
	1 Introduction
	2 Related Work
	3 Method
		3.1 Inverted Index
		3.2 Inverted Index Segmentation Algorithm
		3.3 Keyword Error Correction
	4 Experiments
		4.1 Data
		4.2 Evaluation Methods
		4.3 Analysis of Experimental Results
	5 Conclusion
	Acknowledgement
	References
An Optimization Strategy for Spatial Information Network Topology
	Abstract
	1 Introduction
	2 Satellite Network Topology
	3 Satellite Network Optimization Model
		3.1 Objective Function
		3.2 Model Building
	4 Neighbor Immune Algorithm Based on Simulated Annealing
		4.1 Simulated Annealing Algorithm
		4.2 Neighbor Immune Algorithm
		4.3 NIA Based on Simulated Annealing Algorithm
	5 Simulation Experiment and Analysis
		5.1 Simulation Environment and Parameter Setting
		5.2 Comparison of the Algorithms
	6 Conclusion
	Acknowledgement
	References
Research on Driving Factors of Independent Innovation Capability of New Energy Equipment Manufacturing Enterprises
	Abstract
	1 Introduction
	2 Determining the Driving Factors of Independent Innovation Capability
		2.1 Data Analysis
		2.2 Reliability Test
	3 Construction of Structural Equation Model
		3.1 Basic Principles of Structural Equation Modeling
		3.2 Theoretical Assumptions
		3.3 Data Analysis
	4 Conclusions and Recommendations
	References
A Cross-Platform Instant Messaging User Association Method Based on Spatio-temporal Trajectory
	Abstract
	1 Introduction
	2 Background and Related Work
	3 Cross-Platform Instant Messaging User Association Based on Spatio-temporal Trajectory
		3.1 Get User Information and Trajectory Information
		3.2 Grid User’s Trajectory
		3.3 Calculate the Trajectory Vector
		3.4 Secondary Matching User Trajectory
		3.5 Associating and Fusing User Information
	4 Experiments
		4.1 Experimental Dataset and Evaluation Criteria
		4.2 Experimental Setup
	5 Conclusion
	References
An Improved DNN Algorithm in Sorting Optimization of Intelligent Parcel Cabinets
	Abstract
	1 Introduction
	2 System Model
	3 Proposed Algorithm
		3.1 Classification Algorithm Based on Adaptive K-means
		3.2 Dynamic Optimization Algorithm Based on an Improved DNN
	4 Simulation Results
		4.1 Data Processing
		4.2 Discussion
		4.3 Effectiveness
	5 Conclusion
	Acknowledgement
	References
Design of Storage System Based on RFID and Intelligent Recommendation
	Abstract
	1 Introduction
	2 System Description
	3 Database Design
	4 Hybrid Intelligent Recommendation Algorithm
		4.1 Cosine Similarity Algorithm Based on Goods Attributes
		4.2 K-means Clustering Algorithm
		4.3 Markov Chain Algorithm
	5 Concluding Remarks
	Acknowledgement
	References
Visual Research and Predictive Analysis of Land Resource Use Type Change
	Abstract
	1 Introduction
	2 Data Collection and Processing
	3 Visual Analysis of Land Use Data
		3.1 Spatial Distribution Dimension
		3.2 Time Series Dimension
		3.3 Correlation Analysis Between Socio-economic Factors and Land Use Data
		3.4 Predictive Analysis of Land Use Type Data
	4 Conclusion
	References
A Research on Comprehensive Training Platform on Android for Software Engineering in Qinghai Minzu University
	Abstract
	1 Introduction
	2 Skilled Required for Software Engineering Professionals
	3 Android-Based Training Platform
		3.1 Training Platform System Design
		3.2 Training Platform Architectural Framework
	4 Complete Class Diagram of the Integrated Training Platform Design
	5 Timing Statistics Function
	6 The System Implementation
		6.1 The Control Functions
		6.2 The Client Functions
	7 The System Test
	8 Conclusion
	Acknowledgement
	References
Link Prediction with Mixed Structure Attribute of Network
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 Problem Description
		2.2 Division of the Datasets and Evaluation Metrics
		2.3 Baseline and Comparison Methods
	3 Methods
		3.1 Correlation Analysis
		3.2 Mixed Similarity Index Based on Statistical Characteristic
	4 Experimental Results and Analysis
		4.1 Datasets Description
		4.2 Results and Analysis
	5 Conclusion and Discussion
	References
Analysis of the Relationship Between the Passenger Flow and Surrounding Land Use Types at the Subway Stations of the Batong Subway Line of Beijing Based on Remote Sensing Images
	Abstract
	1 Introduction
	2 Data Source
	3 Current Situation of Land Use Around the Subway Station
		3.1 Target Research Area
		3.2 Obtain the Area of Land Use Type Around the Station Based on Remote Sensing Images
	4 Relationship Between Passenger Flow and Land Use of the Station
		4.1 Relationship Between Average Daily Passenger Flow and Total Area of Each Land Use Type
		4.2 Relationship Between Passenger Flow in Different Periods and Area of Different Land Use Types
	5 Result Analysis
	6 Conclusion
	Acknowledgement
	References
Cloud Computing and Security
SCESP: An Edge Server Placement Method Based on Spectral Clustering in Mobile Edge Computing
	1 Introduction
	2 Related Work
	3 Problem Formulation
		3.1 System Model
		3.2 Problem Model
	4 Algorithm Description
	5 Evaluation
		5.1 Dataset Description
		5.2 Experiment
	6 Conclusion
	References
PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing
	1 Introduction
	2 System and Security Model
		2.1 System Model
		2.2 Security Assumption
	3 Technical Preliminaries
		3.1 Access Structure
		3.2 Bilinear Map
	4 Construction of Our Scheme
		4.1 Setup
		4.2 Key Generation
		4.3 Encryption
		4.4 Time Token Generation
		4.5 Time Trapdoor Exposure
		4.6 Access Token Generation
		4.7 Attributes Verification
		4.8 Ciphertext Precomputation
		4.9 Decryption
	5 Security and Performance Analysis
		5.1 Security Analysis
		5.2 Performance Analysis
	6 Conclusion
	References
A Novel Evaluation Model of Data Security Protection Capability in Edge Computing Environment
	Abstract
	1 Introduction
	2 Related Work
	3 Data Security Protection Evaluation Model
	4 Conclusion
	Conflicts of Interest
	References
Research on Technical System for Cyberspace Surveying and Mapping
	Abstract
	1 Introduction
	2 Concepts Related to Cyberspace Surveying and Mapping
		2.1 Cyberspace
		2.2 Cyberspace Surveying and Mapping
	3 Technical System of Cyberspace Surveying and Mapping
		3.1 Target Classification
		3.2 Cooperative Detection
		3.3 Fusion Analysis
		3.4 Visual Mapping
	4 Conclusion
	References
Software-Defined Industrial Internet of Things (SD-IIoT) Oriented for Industry 4.0
	Abstract
	1 Introduction
	2 The Overview of SD-IIoT Based on Cyber-Physical Space Mapping
	3 The System Architecture of SD-IIoT
	4 Software Definition Mechanism Based on Industrial Information Model for SD-IIoT
	5 Conclusion
	Acknowledgement
	References
Task Scheduling Based on Improved Particle Swarm Optimization for Cloud Computing
	Abstract
	1 Introduction
	2 Task Scheduling Problem Description
	3 Relevant Algorithms
		3.1 Standard Particle Swarm Optimization
		3.2 Simulated Annealing Algorithm
	4 Cloud Computing Task Scheduling Based on PSOSA
		4.1 Particle Coding and Fitness Function
		4.2 Improved Dynamic Inertia Weight Strategy
		4.3 Chaos Disturbance
		4.4 Location and Speed Updates
		4.5 Improved Algorithm Description
	5 Simulation Experiment and Analysis
	6 Summary
	References
Optimization Design of Privacy Protection System Based on Cloud Native
	Abstract
	1 Introduction
	2 Related Work
	3 Optimization Design of Architecture for PPS
		3.1 The Logical Framework of PPS
		3.2 Technical Framework of PPS
		3.3 DevOps
	4 Optimization Design of Preanalysis Modules
	5 Optimization Design of Utility Analysis Modules
		5.1 Asynchronous Communication Technology
		5.2 Auto-scaling
	6 Conclusion
	Funding Statement
	References
Autoperman: Automatic Network Traffic Anomaly Detection with Ensemble Learning
	1 Introduction
	2 Background and Motivation
	3 The Autoperman Framework
		3.1 Overview
		3.2 Feature Generation
		3.3 Classifier
	4 Evaluation
		4.1 Data Sets
		4.2 Experiment Setup
		4.3 Baselines
		4.4 Revisiting the Motivating Example
		4.5 Performance Comparison
	5 Related Work
	6 Conclusion
	References
Emotion Features Research for Internet-of-Emotions
	Abstract
	1 Introduction
	2 Materials and EEG Data Acquire
	3 Related Work of Emotion Feature Based on Wavelet Transform
		3.1 The Selection of Mother Wavelet
	4 Research of Four Emotion Features Based on WT-SVM
	5 Discussion and Conclusion
	Acknowledgement
	References
Computing Offloading Strategy Based on Improved Firework Algorithm
	Abstract
	1 Introduction
	2 System Models
		2.1 Time Delay
		2.2 Energy Consumption Model
		2.3 Computational Model
	3 Offloading Decision Based on GCFA
		3.1 Firework Algorithm
		3.2 Fireworks Particle Coding
		3.3 Fitness Function Design
		3.4 Improvement
	4 Experiment and Analysis
		4.1 Experimental Parameter Setting
		4.2 Simulation Results and Analysis
	5 Conclusion
	Acknowledgement
	Conflicts of Interest
	References
Privacy-Preserving Neural Networks with Decentralized Multi-client Functional Encryption
	1 Introduction
	2 Preliminaries
		2.1 Functional Encryption
		2.2 Convolutional Neural Network
	3 DMCFE-CNN Framework
	4 Experimental Performance Evaluation
	5 Conclusions
	References
Optimization of Space Information Network Topology Based on Spanning Tree Algorithm
	Abstract
	1 Introduction
	2 Related Work
	3 Degree-Guarantee Minimum Spanning Tree Algorithm
		3.1 Build Spanning Tree
		3.2 Replace Edge
		3.3 Add Edge
		3.4 Algorithm Analysis
	4 Experimental Simulation and Result Analysis
		4.1 Data Sets
		4.2 Simulation Analysis Results
	5 Conclusion
	Acknowledgement
	References
Tibetan Language Model Based on Language Characteristics
	1 Introduction
	2 Related Work
	3 Effect and Significance of Tibetan Suffix on Functional Words
		3.1 Structure of Tibetan Characters
		3.2 Effects of the Suffix on Functional Word
	4 Tibetan Language Model Considering Suffix
		4.1 Conventional RNNLM
		4.2 Tibetan Suffix Feature Fusion
	5 Experiments
		5.1 Data Processing
		5.2 Results and Analysis
	6 Conclusion and Future Work
	References
Multimedia Forensics
Digital Forensics Study on Smart Watch and Wristband: Data Sniffing, Backup and Database Analyzing
	Abstract
	1 Introduction
	2 Tools Classification and Techniques Analysis
		2.1 Wireless Sniffing Through Ubertooth
		2.2 Wired Transmission
	3 Methods Utilized in Research
	4 Smart Watch and Wristband Analyzing Examples
		4.1 Wireless Sniffing
		4.2 Wired Transmission
	5 Conclusion
	Acknowledgement
	References
Author Index




نظرات کاربران