ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advances in Computer Science and Ubiquitous Computing: Proceedings of CUTE-CSA 2022

دانلود کتاب پیشرفت در علوم کامپیوتر و محاسبات همه جا حاضر: مجموعه مقالات CUTE-CSA 2022

Advances in Computer Science and Ubiquitous Computing: Proceedings of CUTE-CSA 2022

مشخصات کتاب

Advances in Computer Science and Ubiquitous Computing: Proceedings of CUTE-CSA 2022

ویرایش:  
نویسندگان: , , ,   
سری: Lecture Notes in Electrical Engineering, 1028 
ISBN (شابک) : 9819912512, 9789819912513 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 765
[766] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 27 Mb 

قیمت کتاب (تومان) : 32,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 1


در صورت تبدیل فایل کتاب Advances in Computer Science and Ubiquitous Computing: Proceedings of CUTE-CSA 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت در علوم کامپیوتر و محاسبات همه جا حاضر: مجموعه مقالات CUTE-CSA 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت در علوم کامپیوتر و محاسبات همه جا حاضر: مجموعه مقالات CUTE-CSA 2022

این کتاب مجموعه مقالات چهاردهمین کنفرانس بین‌المللی علوم کامپیوتر و کاربردهای آن (CSA 2022) و شانزدهمین کنفرانس بین‌المللی KIPS در زمینه فناوری‌های اطلاعاتی و کاربردهای همه جا حاضر (CUTE 2022) را ارائه می‌کند که هر دو در وینتیان، لائوس، 19 تا 21 دسامبر برگزار شد. 2022. هدف این دو نشست ترویج بحث و تعامل بین دانشگاهیان، محققان و متخصصان در زمینه فن آوری های محاسباتی همه جا حاضر و علوم کامپیوتر و کاربردهای آن بود. این اقدامات نشان دهنده وضعیت هنر در توسعه روش های محاسباتی، شامل نظریه، الگوریتم ها، شبیه سازی عددی، تحلیل خطا و عدم قطعیت و کاربردهای جدید تکنیک های پردازش جدید در مهندسی، علوم و سایر رشته های مرتبط با محاسبات فراگیر است. را


توضیحاتی درمورد کتاب به خارجی

This book presents the combined proceedings of the 14th International Conference on Computer Science and its Applications (CSA 2022) and the 16th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2022), both held in Vientiane, Laos, December 19-21, 2022. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies & Computer Science and its Applications. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science and other disciplines related to ubiquitous computing. ​



فهرست مطالب

Message from the CSA 2022 General Chairs
Message from the CSA 2022 Program Chairs
CSA 2022 Organization
Message from the CUTE 2022 General Chairs
Message from the CUTE 2022 Program Chairs
CUTE 2022 Organization
Contents
About the Editors
Random Forest in Federated Learning Setting
	1 Introduction
	2 Related Works
	3 System Architecture
		3.1 Motivating Example
		3.2 Architecture Design
	4 Evaluation
		4.1 Experimental Setup
		4.2 Result
	5 Conclusion and Discussion
	References
TL-SMOTE: Re-balancing Data in Federated Learning for Anomaly Detection
	1 Introduction
	2 Related Work
		2.1 Federated Learning
		2.2 Re-balancing Data
	3 Methodology
		3.1 Computational Procedure
		3.2 TL-SMOTE
	4 Experiments and Results
		4.1 Experiment Results
	5 Conclusion
	References
Gaussian Pseudospectral Optimization-Driven Neural Network Planning of Obstacle Avoidance Trajectory
	1 Introduction
	2 Unmanned Vehicle Trajectory Planning Model
	3 Optimization-Driven Neural Network Planning
		3.1 Gauss Pseudospectral Optimization
		3.2 Neural Network Trajectory Planning
	4 Numerical Tests
	5 Summary
	References
Research on Synchronous Control Method of Dual Motor Based on ADRC Speed Compensation
	1 Introduction
	2 Construction of Dual-Motor Synchronous Control System
	3 Design of Speed Compensator
		3.1 LADRC
		3.2 Design of Fuzzy-LADRC
	4 Experimental Verification and Analysis
		4.1 Experimental Verification
		4.2 Analysis of Experimental Results
	5 Conclusions
	References
MDagg: A New Aggregation Method Using Mahalanobis Distance
	1 Introduction
	2 Backgrounds
		2.1 Federated Learning
		2.2 Poisoning Attack in FL
		2.3 Gradient Aggregation Rule
		2.4 Mahalanobis Distance
	3 Proposed Algorithm
		3.1 Problem Definition
		3.2 Algorithm
	4 Experiment
		4.1 Attack on Aggregation Rules
		4.2 Robustness of the Algorithm
	5 Conclusion
	References
Graphormer-NAS-X: A Novel Graphormer-Based Neural Architecture Search Method
	1 Introduction
	2 Related Work
	3 Methods
		3.1 Graphormer
		3.2 Graphormer-NAS-X
	4 Experiments
	5 Conclusions
	References
Secondary Salient Feature-Based GNN for Few-Shot Classification
	1 Introduction
	2 Methodology
		2.1 Problem Definition
		2.2 Overall Framework
		2.3 Loss Function
	3 Experiments
		3.1 Datasets
		3.2 Performance
	4 Conclusion
	References
Mixup Cluster Contrastive Learning Over Harder Samples for Unsupervised Person Re-identification
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Contrastive Learning Framework
		3.2 Cluster Centroid Contrast
		3.3 Mixup for Harder Samples
		3.4 Overall Contrastive Loss and Optimization
	4 Experiments
		4.1 Results
		4.2 Ablation Study
	5 Conclusion
	References
UWB and IMU Fusion Positioning Based on ESKF with TOF Filtering
	1 Introduction
	2 UWB and IMU Related Work
		2.1 UWB
		2.2 IMU
	3 UWB and IMU Fusion Positioning
		3.1 ESKF
		3.2 UWB Measurements Filtering
	4 Experiment
	5 Conclusion
	References
Observation Noise Covariance Matrix Initialization-Based Objective State Estimation for Kalman Filter Using SVR
	1 Introduction
	2 Objective State Estimation Model Construction
		2.1 Support Vector Regression Principle
		2.2 Mean Initialized Rkmean
		2.3 Kalman Filtering Principle
	3 Experiment
		3.1 Support Vector Regression Fitting Results
		3.2 Multi-objective State Estimation Results
	4 Conclusion
	References
Development of the Fire Analysis Framework for the Thermal Power Plant
	1 Introduction
	2 Implementation of the Framework
		2.1 Data Acquisition and Refinery Engine
		2.2 Sensor Tag Processing Engine
		2.3 Sensor Data Processing Engine
		2.4 Logging Engine
	3 Visualizing Data of the Framework
	4 Conclusion
	References
Mortality Forecasting Using Data Augmentation
	1 Introduction
	2 Related Research
		2.1 Mortality Forecasting Model and Artificial Neural Networks
		2.2 Time-Series Data Augmentation
	3 Data Augmentation
		3.1 Datasets for Data Augmentation
		3.2 Data Augmentation Method
	4 Experiments
		4.1 Experimental Process and Environment
		4.2 Experimental Results
	5 Conclusion
	References
Spatial–Temporal Reservation-Based Multi-vehicle Cooperative Speed Guidance
	1 Introduction
	2 Algorithm Design-Related Work
		2.1 Passage Scenario Division
	3 Spatial–Temporal Reservation
		3.1 Temporal Reservation Model
		3.2 Spatial Reservation Model
		3.3 Model Solutions
	4 Experiment
		4.1 Experimental Condition Settings
		4.2 Comparison of Vehicle Travel Maps
		4.3 Analysis of Average Vehicle Travel Time
	5 Conclusion
	References
A Research on Quantum Repeater Platform Using Drone: Utilization Methods and Considerations
	1 Introduction
	2 Related Work
	3 Utilization Methods and Considerations
	4 Proposed Drone Prototype Model
		4.1 Design Overview
		4.2 Rotor Configuration
		4.3 Rotor Configuration
	5 Conclusions and Future Work
	References
Implementation of Virtual Sensor for Semiconductor Process Verification Using Machine Learning
	1 Introduction
	2 Related Research
		2.1 Semiconductor Process
		2.2 Machine Learning
	3 Suggestion Method
		3.1 Single Virtual Sensor
		3.2 Multiple Virtual Sensors
	4 Experiments
		4.1 Single Virtual Sensor
		4.2 Multiple Virtual Sensors
	5 Conclusion
	References
An Analysis of the Longitudinal Changes in the Determining Factors for Adolescents’ Self-esteem with Random Forests
	1 Introduction
	2 Dataset
	3 Analysis with Random Forests
		3.1 Overview
		3.2 Analysis Results
	4 Conclusion
	References
Design of Multi-channel Ethernet System Based on FPGA
	1 Introduction
	2 System Design
		2.1 System Hardware Design
		2.2 System Software Module Design
	3 Result and Conclusion
	References
Design of 2D to 3D Pose Estimation Using NeRF Image View Synthesis
	1 Introduction
	2 Related Works
		2.1 3D Pose Estimation
		2.2 NeRF Based Image View Synthesis
	3 Pose Estimation Using NeRF Image View Synthesis
		3.1 2D Image View Synthesis Using Instant-NGP
		3.2 Mesh Model Preprocessing and Skeleton Construction
	4 Conclusion
	References
Pet Multiple Behavior Recognition Through Sensor Data Synthesis
	1 Introduction
	2 Related Works
		2.1 GAN-Based Data Augmentation
		2.2 Behavior Recognition Using Sensor Data
	3 Pet Multiple Behavior Recognition
		3.1 Data Collection
		3.2 Data Preprocessing
		3.3 GAN-Based Data Augmentation Model
		3.4 Multiple Behavior Recognition
	4 Conclusion
	References
Research on AFS/DYC Coordinated Control Strategy for Four-Wheel Independently Driven Electric Vehicle Based on In-Wheel Motor
	1 Introduction
	2 Vehicle Dynamics Modeling
		2.1 Vehicle Dynamics Model with Seven Degrees of Freedom (DOF)
		2.2 Drive System Model
		2.3 Tire Model
	3 Vehicle Controller Design
		3.1 Ideal Reference Model
		3.2 Design of AFS and DYC Controller Based on SMC
		3.3 AFS/DYC Integrated Control Weight Distribution
		3.4 Dynamic Load Torque Distribution
	4 Simulation and Result Analysis
	5 Conclusions
	References
A Study on the Construction of Crime Prevention System Using the Hadoop Model of Big Data- with Focus on Utilizing Big Data and CPTED Technology in Gimcheon-Si -
	1 First Section
	2 The State of Crimes Between 2018 and 2019 by Big Data in Gimcheon
	3 The Prevention of Adolescent Crime by Utilizing Big Data and CPTED Technology
	4 Conclusion
	References
Application of Multi-variable Double-Layer MPC in Energy-Saving Operation of Central Chiller
	1 Introduction
	2 The Overall System Architecture
		2.1 Building and System Description
		2.2 Modeling of the System
	3 Double-Layered MPC for State-Space Model
		3.1 Open-Loop Prediction
		3.2 Steady-State Target Calculation
		3.3 Dynamic Calculation Module
	4 Application Example
	5 Conclusions
	References
Study on AEB Control Strategy Considering Vehicle Load Variation
	1 Introduction
	2 System Architecture
		2.1 Maximum Braking Torque Limiting Module
		2.2 Vehicle Mass Estimation Module
		2.3 Time Safety Model Considering Vehicle Mass
		2.4 Brake Control Module
	3 Simulation and Real Vehicle Test Results
	4 Conclusion
	References
Enhancing System Utilization by Dynamic Reallocation of Computing Nodes
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
Efficient Detection of Skin Cancer Using Deep Learning Techniques and a Comparative Analysis Study
	1 Introduction
	2 Methodology
	3 Experiments and Results
		3.1 Model Evaluation
		3.2 Experimental Results
	4 Conclusion
	References
Autonomous Cooperative Driving Protocol Based on the Security Status of IVN
	1 Overview
	2 Existing Autonomous Cooperative Driving Method
		2.1 Vehicle Classification for Cooperative Driving
		2.2 Cooperative Driving Strategy
	3 Proposed Cooperative Driving Protocol
		3.1 Vehicle Classification Based on Security Status of IVN
		3.2 Proposed Cooperative Driving Strategy
	4 Cooperative Driving Response Plan
	References
Confidence Calibration of Hand Gesture Recognition Networks Based on Ensemble Learning
	1 Introduction
	2 Calibrating the Classifier
	3 Experiments and Results
	References
Optimization Strategy for Residential Heating Based on Model Predictive Control
	1 Introduction
	2 Method
		2.1 Building Thermal Model
		2.2 System Optimization
	3 Model Validation and Simulation Result
	4 Conclusion
	References
A Study on the Development of a Crop Disease Diagnosis Mobile App Service Based on Deep Learning
	1 Introduction
	2 Methodology
		2.1 Preparing Datasets
		2.2 Image Captioning Model Construction
		2.3 Object Detection Model Construction
		2.4 Designing and Implementing Application
	3 Result
	4 Conclusion
	References
A Study on the Development of SDGs Implementation Analysis System at Universities Based on NLP
	1 Introduction
	2 Methodology
		2.1 Develop SDGs Activity Classification Model
		2.2 Identifying Similar Cases at Overseas Universities Through Keyword Extraction and Similarity Measurement
	3 Result
	4 Conclusion
	References
Object Detection Improvements on Skin Burn Image Data via Data Augmentation and Semi-supervised Learning
	1 Introduction
	2 Method
		2.1 Data Collection
		2.2 Data Augmentation
		2.3 Machine Learning
		2.4 Measurement
	3 Result
	4 Conclusion
	References
Establishment of NLP-Based Greenwashing Pattern Detection Service
	1 Introduction
	2 Methodology
		2.1 Configuration Greenwashing Assessments and Collecting Data
		2.2 Constructing Sentiment Analysis Model of Greenwashing
	3 Results
	4 Conclusion
	References
Multiclass Classification of Online Comments Based on Toxicity Scale
	1 Introduction
	2 Experimental Setup
		2.1 Dataset
		2.2 Annotation
		2.3 Model
	3 Results
	4 Conclusion
	References
Developing a Speech Recognition Service for Korean Speakers with Dysarthria
	1 Introduction
	2 Methodology
		2.1 Data Preparation
		2.2 Building and Training the Model
	3 Result
	4 Conclusion
	References
Korean Twitter Bot Detection via Deep Learning
	1 Introduction
	2 Methodology
	3 Result
	4 Conclusion
	References
Development of Literature Short-Form System Using Emotional Keyword
	1 Introduction
	2 Methodology
		2.1 Raw Data and Data Preprocessing
		2.2 Core Text Extraction Model
		2.3 Emotion Classification Model
		2.4 Imaging Algorithm
	3 Result
	4 Conclusion
	References
English Pronunciation Correction Service for Hearing-Impaired People: BETTer, Focusing on the Personalized Speech Model
	1 Introduction
	2 Methodology
		2.1 Preparing Content Data
		2.2 Providing Personalized Answer Speech
		2.3 Evaluation System and Feedback
	3 Result
	4 Conclusion
	References
Improving the Preformance of Judicial Precedent Search by Fine-Tuning S-BERT
	1 Introduction
		1.1 A Subsection Sample
	2 Related Work
		2.1 Rule-Based Legal Search System
		2.2 Legal Search System Based on Text Mining
		2.3 Embedding-Based Legal Search System
	3 S-BERT-Based Legal Search
		3.1 Legal Search System Process
		3.2 S-BERT Embedding Vector and Similarity
	4 Experiment Result
	5 Conclusions
	References
Machine Learning-Enabled Distributed Framework for Attack Detection in Social Networks
	1 Introduction
	2 Proposed Framework
		2.1 Design Overview Proposed Framework
		2.2 Methodological Flowchart of the Proposed Framework
	3 Conclusion
	References
Analysis of Noise Reduction Measures for 220 kV Substation Based on Acoustic Simulation Technology
	1 Introduction
	2 Overview of Substation Noise
	3 Influence of Sound Absorbing and Insulating Materials on Noise Control in Substation
		3.1 Sound-Absorbing Materials
		3.2 Sound-Insulation Materials
		3.3 Simulation Data Analysis
	4 Conclusion
	References
A Study on Metaverse Realistic Content Education Platform Using Deep Learning
	1 Introduction
	2 Metaverse Education Platform Configuration
	3 Implementation
	4 Conclusion
	References
Strategies for Establishing u-health Care Center Through Research on u-health Service Awareness and Intention to Use
	1 Introduction
	2 Materials and Methods
	3 Results
	4 Conclusion
	References
Method of Predicting the Danger Zone of Tidal Greening Using Machine Learning
	1 Introduction
	2 Random Forest Model
	3 Mud Greening Risk Prediction Model
		3.1 Selection of Key Variables for Ocean Data Preprocessing and Analysis
		3.2 Predicting Future Ocean Data Through Time Series Data Analysis
		3.3 Results of Selecting the Location of the Sea Forest
	4 Conclusion
	References
A Study on the Location Selection Model for a Remote Image Dispenser Using Machine Learning
	1 Introduction
	2 Related Research
		2.1 K-means Algorithm
		2.2 Elbow Method
	3 Remote Image Dispenser System
		3.1 Location Selection Analysis
		3.2 Local Setting Using Elbow Method
		3.3 Final Location Selection Result for Remote Video Dispensing Machine
	4 Conclusion
	References
Passive Indoor Human Tracking Using Commodity Wi-Fi
	1 Introduction
	2 Preliminaries
		2.1 Overview of CSI
		2.2 CSI Error Correction
	3 Methodology
		3.1 Analysis of Hratio ( f,t )
		3.2 Static Component Elimination
	4 Implementation
	5 Evaluation
	6 Conclusion
	References
Research and Application on 5G-V2X-Based Enhanced Automated Valet Parking Key Technologies
	1 Introduction
	2 Definition of Anomalies in Process of AVP
	3 5G-V2X-Based Anomaly Detection Techniques
		3.1 Method for Detecting Abnormal AVP Events Using Surveillance Image
		3.2 Method for AVP Anomaly Detection Using Sensor Data
	4 Conclusion
	References
Sensitivity Analysis and Multi-optimization on Building Performance in Tube-Style Dwellings in the Rural Area of Northern Zhejiang Province
	1 Introduction
	2 Field Survey and Model Establishment
		2.1 Field Survey on EC of RTBs
	3 Sensitivity Analysis
	4 Multi-objective Optimization
	5 Conclusions
	References
Study on the Cooling Effect of Green Space in Shandong Peninsula Coastal Cities Based on Multi-source Remote Sensing Data
	1 Introduction
	2 Materials and Methods
		2.1 Study Area
		2.2 Data Sources and Pre-processing
	3 Results
		3.1 Land Surface Temperature Distribution
		3.2 Cooling Effect in Coastal Cities
	4 Conclusion
	References
Quantification Korean Skin Color Using Multi-color Space for Objective Skin Tone Classification
	1 Introduction
	2 Methods
		2.1 Overview of Proposed System
		2.2 Acquisition of Skin Image
		2.3 Skin Tone Grading
	3 Results
	4 Conclusions
	References
Segmentation of UV Images Based on U-Net for Precisely Analyzing Cutaneous Pigmentation: A Pilot Study
	1 Introduction
	2 Methods
		2.1 Acquisition of UV Images
		2.2 Image Preprocessing
		2.3 Model Architecture Based ResNet50 and U-Net
	3 Results
	4 Discussion and Conclusion
	References
Korean-Vietnamese Neural Machine Translation at Sub-word Level
	1 Introduction
	2 Neural Machine Translation
		2.1 Encoder and Decoder
		2.2 Attention Mechanism
	3 Byte Pair Encoding
	4 Experimentation and Result
		4.1 Vietnamese-Korean Parallel Corpus
		4.2 Experiment, Evaluation and Result
		4.3 Discussion
	5 Conclusions and Future Work
	References
Classification of the Factors Influencing Center of Pressure Using Machine Learning and Wavelet Analysis
	1 Introduction
	2 Method
		2.1 Participants
		2.2 Experimental Procedures
		2.3 Data Processing
		2.4 Statistical Analysis
	3 Results
		3.1 COP Average Velocity
		3.2 Classification of Vibration and Non-vibration Conditions
	4 Discussion
	5 Conclusion
	References
A Local Assessment Approach for Diagnosis of Thermal Imaging-Based Palmar Hyperhidrosis
	1 Introduction
	2 Methods
		2.1 Data Acquisition
		2.2 Data Processing for Analysis
	3 Results
	4 Conclusions
	References
A Study on Internet Annotation Analysis System Using Opinion Mining
	1 Introduction
	2 Big Data Sentiment Analysis for Internet Comments
	3 Result of Big Data Sentiment Analysis
	4 Conclusion
	References
Real-Time Pressure Feedback Sensor Designed for Manual Therapy—A Pilot Clinical Feasibility Study
	1 Introduction
	2 Method
		2.1 Glove-Type Real-Time Pressure Feedback System
		2.2 Experimental Protocol for Pressure Quantification
		2.3 Data Analysis and Trend Equation
		2.4 Clinical Data Collection and Analysis
	3 Results
		3.1 Trend Equation
		3.2 Clinical Data
	4 Discussion
	5 Conclusion
	References
A Blockchain-Based CCP Data Integrity Auditing Protocol for Smart HACCP
	1 Introduction
	2 Remote Data Integrity Auditing Scheme
	3 Blockchain-Based Data Integrity Auditing Protocol
		3.1 System Model
		3.2 Proposed Protocol
	4 Discussion
	5 Conclusion
	References
BPFL: Blockchain-Enabled Distributed Edge Cluster for Personalized Federated Learning
	1 Introduction
	2 Related Work
	3 Distributed Edge Cluster for PFL
	4 Remarks and Discussion
	5 Conclusion
	References
Healthcare Big Data Analysis Using Representative National Community Health Survey of 2021: Is Income Change Due to Covid-19 Pandemic Associated with Unmet Healthcare Needs in S. Korea
	1 Introduction
	2 Method and Materials
		2.1 Data and Study Subject
		2.2 Variables
		2.3 Statistical Analysis
	3 Results
		3.1 Descriptive Statistics
		3.2 Multivariate Analysis Using Survey Logistic Analysis
	4 Future Research Direction
	References
River Health Assessment Based on an Artificial Neural Network
	1 Introduction
	2 Materials and Methods
		2.1 Study Area
		2.2 Data Collection and Analytical Methods
		2.3 River Health Indicator System and Score Criteria
		2.4 Artificial Neural Network Modeling
	3 Results and Discussion
		3.1 Modeling and Result
		3.2 River Health Assessment
	4 Conclusions
	References
Optimization of Low Impact Development Scenarios Based on Computer-Aided Design
	1 Introduction
	2 Method
		2.1 Landuse Classification
		2.2 Hydraulic and Water Quality Model Establishment
		2.3 Low Impact Development Scenarios
		2.4 Comprehensive Evaluation
	3 Preliminary Result
	4 Conclusion
	References
The Development of Expressive Vocabulary of Korean Learners as a Heritage Language
	1 Introduction
	2 Methods
		2.1 Data
		2.2 Keywords Analysis Method
	3 Result
	4 Conclusion
	References
Applying Process Mining Techniques in Sewage Treatment Plant Management
	1 Introduction
	2 Background
		2.1 Current Status of Sewage Treatment Plant
		2.2 Current Status of Process Mining
	3 Conformance Checking of Sewage Treatment Plant
		3.1 Date and Preprocessing
		3.2 Process Modeling and Conformance Checking
	4 Conclusion and Discussion
	References
Intelligent Sewage Treatment Control System Based on Digital Twin
	1 Introduction
	2 Related Works
	3 System Architecture
		3.1 Data Collection
		3.2 Data Transmission
		3.3 3D Visualization
		3.4 Data Prediction
		3.5 Remote Interaction
	4 Results
	5 Conclusion
	References
Visual Simulation and Demonstration of Building Quality Improvement in Existing Residential Areas Driven by Integrated Information System
	1 Introduction
	2 Method
	3 Result
		3.1 The Existing Survey of the Live Area and the Construction of Basic Databases
		3.2 Demonstration of Quality Degradation Problems and Improvement Target Generation
		3.3 H & Level Target and Quality Improvement Strategy Integration Generation
		3.4 Quality Improvement Strategy Simulation and Efficiency Simulation
	4 Conclusion
	References
A Study on the Integrated Database of Sino-Korean Words in 
	1 Necessity for This Study
		1.1 A Subsection Sample
	2 The Subject of This Study
	3 Research Promotion Strategy
	4 Conclusion
	References
A Case Study on Data Mining for Korean Painting Poetry
	1 Introduction
	2 Research Methods
		2.1 Data
		2.2 Data Mining Techniques
	3 Result
		3.1 Extracting and Cataloguing
		3.2 Type Classification
		3.3 Syllable Unit Segments and Statistics
		3.4 Analysis of the Meaning of Corpus
	4 Conclusion
	References
A Study on Digital Content Using Yun Dong-Ju’s Works
	1 Introduction
	2 Related Works
		2.1 Yoon Dong-Ju's Life and Works
		2.2 Contents Related to Yoon Dong-Ju
	3 Contemporary Literature and Content
	4 Conclusion
	References
Digital Transformation of Simulation Process to Support Decision-Making on Green Remodeling
	1 Introduction
	2 Methodology
	3 Results
	4 Conclusions
	References
An Application of Deep Neural Network in Facade Planning of Coastal City Buildings
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
A Study of Students Studying Abroad to Tang in the Late Silla’s Pass an Imperial Examination and Representation Using Database
	1 Introduction
	2 Related Works
	3 Analysis of Pass an Imperial Examination and Representation Charts
	4 Conclusion
	References
Study on the Spatial Evolution of Rural Housing’s Courtyard Based on the Perspective of Space Syntax
	1 Introduction
	2 Cases and Methods
		2.1 Methods
		2.2 Cases
	3 Results
		3.1 Evolution of Syntactic Features of Courtyard Based on Gamma Analysis
	4 Conclusions
	References
The Syntactic Changes of Traditional Rural House and Its Influence by Modernization
	1 Introduction
	2 Cases and Methods
		2.1 Cases
		2.2 Methods
	3 Analysis and Results
		3.1 Evolution of Syntactic Features of Living Space in Stability Form Analysis
		3.2 Evolution of Transition Space Ratio
	4 Conclusions
	References
A Quantitative Study on the Spatial Mechanism of Zhejiang Traditional Dwellings Based on Space Syntax
	1 Introduction
	2 Materials and Methods
	3 Data Analysis
		3.1 Type Characteristics Analysis
		3.2 Spatial Relationship Analysis
	4 Conclusion and Discussion
	References
Construction and Verification of the Evaluation Scale for Architectural Design Scheme Based on Knowledge Engineering
	1 Introduction
	2 Methodology
		2.1 Knowledge Acquisition and Utilization
		2.2 Knowledge Verification
	3 Results and Discussions
		3.1 Pretreatment and Adaptability Analysis
		3.2 Analysis of Validity Test Results
		3.3 Analysis of Reliability Test Results
	4 Conclusions
	References
Development of Indoor Air Quality Management Using Automatic Control of Home Appliances
	1 Introduction
	2 System Overview
	3 Experiment
		3.1 Outline of Experiment
		3.2 CO2 Concentration Measurement Before System Introduction
		3.3 CO2 Concentration Measurement After System Introduction
	4 Conclusion
	References
A Model for Detection of the Susceptible in Hospital Contact Network Based on Social Network Analysis
	1 Introduction
	2 Related Work
	3 Model for Detection of the Susceptible in Hospital Contact Network
		3.1 Problem Statement
		3.2 Detection of the Susceptible in Hospital Contact Network
	4 Experiment and Results Analysis
		4.1 Dataset
		4.2 Results and Analysis
	5 Conclusion
	References
A Modern Recommendation System Survey in the Big Data Era
	1 Introduction
	2 Modern Recommendation Systems in the Big Data Era
		2.1 How Do We Filter the Related Journals?
		2.2 Overview of Recommendation Systems
		2.3 Modern Recommendation Systems
	3 Specific Domain of Recommendation Systems
	4 Conclusion
	References
Privacy-Aware Intelligent Healthcare Services with Federated Learning Architecture and Reinforcement Learning Agent
	1 Introduction
	2 Related Works
	3 Optimized FL for Privacy-Aware Intelligent Healthcare
		3.1 System Architecture
		3.2 Components for Optimization Procedures
	4 Simulation Environment and Result Discussions
	5 Conclusion
	References
ML/SDN-Based MEC Resource Management for QoS Assurances
	1 Introduction
	2 Related Works
		2.1 Emergence of MEC, NFV, and SDN
		2.2 Machine Learning-Based and Priority Queue Control Mechanisms
	3 ML/SDN-Based Resource Management for QoS Assurances
		3.1 SDN-Based Management of vMEC Resources
		3.2 K-Mean-Based Multi-service QoS Prioritization
	4 Conclusion
	References
Movie Recommendation System Using Community Detection Based on the Girvan–Newman Algorithm
	1 Introduction
	2 Related Work
		2.1 Recommendation Systems
		2.2 Community Detection
	3 Design for Movie Recommendation System Using Community Detection Based on the Girvan–Newman Algorithm
	4 Experiment and Result Analysis
	5 Conclusion
	References
Efficient Container Management Scheme Based on Deep Learning Model
	1 Introduction
	2 Related Works
	3 ECMS Scheme
	4 Conclusion
	References
Actual Resource Usage-Based Container Scheduler for High Resource Utilization
	1 Introduction
	2 Related Works
	3 Scheme of Actual Resource Usage-Based Scheduler (ARUS)
	4 Conclusions
	References
Solving Pre-erection Area Block Placement Problem Using Deep Reinforcement Learning
	1 Introduction
	2 Related Works
	3 Methods
		3.1 Data
		3.2 Reinforcement Learning
	4 Experiment
	References
Design of Reliable Electronic Document Based on HTML and Blockchain
	1 Introduction
	2 Related Research
		2.1 Electronic Document
		2.2 Blockchain
	3 Reliable Electronic Document System
		3.1 Design of Reliable Electronic Document System
		3.2 Design of Reliable Electronic Document Converter
		3.3 Design of Reliable Electronic Document Archiver
	4 Experimental Validation
	5 Conclusion
	References
Multi-armed Bandit-Based Rate Control with Logarithmic Rates in CSMA/CA Wireless Networks
	1  Introduction
	2  Multi-armed Bandit Algorithms Using Logarithmic Rates
		2.1 Thompson Sampling Using Log Rate (TS-LogR)
		2.2 KL-UCB Using Log Rate (KL-UCB-LogR)
	3  Experiments
		3.1 Simulation Scenarios
		3.2 Simulation Results
	4  Conclusion
	References
The Design and Implementation of Medicine Recognition System Using the TensorFlow Lite
	1 Introduction
	2 Related Works
	3 The Design of Recognition System
		3.1 Drug Recognition Model
		3.2 System Concept and Architecture
	4 Implementation
	5 Conclusion
	References
Development of Ubiquitous Flip Learning Model Based on Backward Design
	1 Introduction
	2 Development of Ubiquitous Flip Learning Teaching and Learning Model Based on Backward Design
	3 Teaching and Learning Model Application and Analysis
	4 Conclusion
	References
KoBART-Based Hybrid Literacy Improvement System for Each Level for Efficient Reading
	1 Introduction
	2 Related Works
		2.1 GPT-3
		2.2 KoGPT
		2.3 KoBART
		2.4 TextRank Algorithm
		2.5 Rouge
	3 Proposed Method
		3.1 Development Environment
		3.2 KoBART-Based Hybrid Literacy Improvement System
		3.3 Evaluation Literacy-Based ROUGE
	4 Experimental Results
	5 Conclusions
	References
Extracting Low-Power Code Pattern Method Through Power Measurement of Software Code
	1 Introduction
	2 Related Works
	3 Low-Power Code Pattern to Minimize Power Consumption
		3.1 Low-Power Pattern
		3.2 Power Measurement Environment
		3.3 Low-Power Code Pattern Definition
	4 Conclusion
	References
A Study on Improved Pet Behavior Monitoring Through Data Imputation Using Multiple Data
	1 Introduction
	2 Related Works
		2.1 Generative Adversarial Network
		2.2 Pet Behavior Monitoring
	3 The Proposed Pet Behavior Monitoring
		3.1 Data Collection
		3.2 Data Preprocessing
		3.3 Behavior Monitoring
	4 Conclusion
	References
Deep Learning SPIN Pattern Outlier Detection for Integrated Dynamic Rotary Machine
	1 Introduction
	2 Spectrogram Power Integrated Pattern (SPIN Pattern) Outlier Detection Model
		2.1 Raw Data and STFT
		2.2 STFT-Power Integrated Pattern
	3 SPIN Pattern Outlier Detection
		3.1 SPIN Pattern
		3.2 SPIN Pattern CNN Outlier Detection
	4 Result
	References
Optimized Vehicle Fire Detection Model Based on Deep Learning
	1 Introduction
	2 Related Work
		2.1 Surveillance System Technology Using Artificial Intelligence on CCTV
		2.2 Deep Learning Model
	3 Optimized Vehicle Fire Detection Model
		3.1 Transfer Learning
		3.2 Model Ensemble
		3.3 Improved Fire Recognition Accuracy Through RegNet-Based Architecture Changes
	4 Experiment Result
	5 Conclusion
	References
Smarteria: Intelligent Cafeteria Using Multimodal Data
	1 Introduction
	2 Related Work
		2.1 Person Detection
		2.2 Flammable Object Detection
		2.3 Water Detection
		2.4 Utilize Multimodal Data
	3 Proposed Systems
		3.1 Conceptual Framework
		3.2 System Process
		3.3 Object Detection Data Analysis
	4 Experiments’ Evaluation
		4.1 Hardware
		4.2 Training and Testing YOLOv5 Models
		4.3 Real-Time Dangerous Situation Detection Test
	5 Conclusion
	References
Post-training with Data Augmentation for Improving T5-Based Question Generator
	1 Introduction
	2 Related Work
	3 Answer-Aware Question Generation
	4 Post-training with Data Augmentation
	5 Experiments
		5.1 Experimental Settings
		5.2 Experimental Results
	6 Conclusions
	References
A Memory Replay-Based Continual Learning Utilizing Class Representative and Class Boundary Data
	1 Introduction
	2 Proposed Method
	3 Experiments
	4 Conclusion
	References
Automatic Classification for Representative Spatio-temporal-Based Event Document Using Machine Learning
	1 Introduction
	2 Related Work
		2.1 Textual Event Extraction
		2.2 Machine Learning for Event Extraction
	3 Materials and Methods
		3.1 Data Sources
		3.2 Data Preprocessing
		3.3 Machine Learning
	4 Evaluation
	5 Conclusion
	References
Case Monitoring for Secondary Battery Transfer with Enhanced Fire Prevention and Stability
	1 Introduction
	2 Design and Experiment
		2.1 Monitoring Circuit
		2.2 Lab Tester for Secondary Battery Carrying Case Monitoring
		2.3 Secondary Battery Carrying Case Monitoring Process
	3 Result and Discussion
	4 Conclusion and Future Research Direction
	References
Effective Use of Knowledge Graphs in a Language Representation Model
	1 Introduction
	2 Knowledge Graphs
	3 Topic Modeling
	4 Method
	5 Experiment
		5.1 Experiment Environment
		5.2 Results
	6 Conclusion
	References
The Performance Analysis of Lightweight Neural Networks for Salient Object Detection
	1 Introduction
	2 The Analysis of Existing Lightweight Techniques
		2.1 The Baseline Network
		2.2 Enhancing Lightweight Neural Networks Block
		2.3 Attention Mechanism
		2.4 Feature Aggregation Module
	3 Performance Comparisons
	4 Future Research Directions and Conclusion
	References
Pendulum: An I/O Efficient Algorithm for Nearest Surrounder Queries in 3D Space
	1 Introduction
	2 Related Work
	3 Query Processing in 3D Geospatial Environment
		3.1 Angular Measurements of 3D Spatial Objects
		3.2 Pendulum Algorithm for 3DNS Query Processing
	4 Conclusion
	References
Proposal of Telehealth Service Reference Models as a Prerequisite for Cybersecurity Risk Analysis
	1 Introduction
	2 Related Research
		2.1 Telehealth Terminology
		2.2 Telehealth Service Models
	3 Reference Models of Telehealth Services
		3.1 Healthcare Service Activities
		3.2 Reference Model of Telemedicine Services
		3.3 Reference Model of Teleconsultation Services
		3.4 Reference Model of Telecare Services
	4 Conclusion
	References
A Challenge of the Representative Spatiotemporal Document Classification and Spatiotemporal Information Extraction
	1 Introduction
	2 Related Work
	3 Method
	4 Analysis Results
		4.1 Quantitative Data Analysis Results
		4.2 Qualitative Data Analysis Results
	5 Conclusion
	References
IoT Sensor Predictive Analysis System Using Apache Spark in Edge Cloud Environment
	1 Introduction
	2 Related Work
		2.1 Apache Spark
		2.2 LSTM with Apache Spark
		2.3 Apache Airflow
	3 Proposed System
		3.1 System Architecture
		3.2 Data Reliability Calculate
	4 Experiment Evaluation
	5 Conclusion
	References
MetaOps: Metaverse Operations for Large-Scale Metaverse Services on Distributed Cloud
	1 Introduction
	2 Related Work
	3 Method
		3.1 Main Framework
		3.2 Edge Cloud DPU Node
		3.3 3D Metaverse Avatar
	4 Evaluation Metrics and Analysis
		4.1 DPU Node—CPU Performance
		4.2 User Interaction—Client Performance
	5 Conclusions
	References
A Study on the Improvement of Internet Comment Accuracy Using Deep Learning
	1 Introduction
	2 Related Work
		2.1 BERT
		2.2 Crowdsourcing
		2.3 Malicious Comments Detection Method Using AI
	3 Proposed System
		3.1 DCAC-Based Comment Classification Scheme
	4 Experiment and Related Results
		4.1 Environment
		4.2 Experiment
		4.3 Result
	5 Conclusion and Follow-Up Research
	References




نظرات کاربران