دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li سری: Lecture Notes in Computer Science, 13657 ISBN (شابک) : 3031201019, 9783031201011 ناشر: Springer سال نشر: 2023 تعداد صفحات: 706 [707] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 55 Mb
در صورت تبدیل فایل کتاب Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب یادگیری ماشین برای امنیت سایبری: چهارمین کنفرانس بین المللی، ML4CS 2022، گوانگژو، چین، 2 تا 4 دسامبر 2022، مجموعه مقالات، قسمت سوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
مجموعه مقالات سه جلدی LNCS 13655,13656 و 13657، مجموعه
داوری چهارمین کنفرانس بین المللی یادگیری ماشین برای امنیت
سایبری، ML4CS 2022 است که در 2 تا 4 دسامبر 2022 در گوانگژو، چین
برگزار شد.
100 مقاله کامل و 46 مقاله کوتاه که در این مجموعه مقالات گنجانده
شده بودند، با دقت بررسی و از بین 367 مقاله ارسالی انتخاب
شدند.
The three-volume proceedings set LNCS 13655,13656 and
13657 constitutes the refereedproceedings of the 4th
International Conference on Machine Learning for Cyber
Security, ML4CS 2022, which taking place during December 2–4,
2022, held in Guangzhou, China.
The 100 full papers and 46 short papers were included in these
proceedings were carefully reviewed and selected from 367
submissions.
Preface Organization Contents – Part III Design of Active Defense System for Railway Communication Network Based on Deep Neural Network 1 Introduction 2 Hardware Design of Active Defense System for Railway Communication Network 2.1 Design Railway Communication Network Monitoring Terminal 2.2 Design Railway Communication Network Alarm 2.3 Designing a Railway Communication Network Intrusion Data Parser 2.4 Design the Active Defense Circuit of Railway Communication Network 3 Software Design of Active Defense System for Railway Communication Network 3.1 Collecting Spatial Data of Railway Communication Network 3.2 Extraction of Railway Communication Network Intrusion Data Features Based on Deep Neural Network 3.3 Constructing the Active Defense Model of Railway Communication Network 4 Test Analysis 4.1 Test Plan 4.2 Functional Testing 4.3 Performance Test 5 Conclusion References Human Resource Network Information Recommendation Method Based on Machine Learning 1 Introduction 2 Filtering Based on Machine Learning Information 3 Human Resource Network Information Recommendation Based on Machine Learning 3.1 Construction of Time-Series Behavior Preference Features 3.2 Data Preprocessing 3.3 Human Resource Network Information Recommendation Process 4 Experiments 4.1 Experimental Setup 4.2 Experimental Indicators 4.3 Analysis of the Effectiveness of Information Collection 4.4 Experimental Results and Analysis 5 Conclusion References Machine Learning Based Abnormal Flow Analysis of University Course Teaching Network 1 Introduction 2 Construction of Network Traffic Identification Model Based on Machine Learning 3 Traffic Analysis of University Course Teaching Network Based on Machine Learning 3.1 Data Screening 3.2 Model Training 3.3 Design of Network Traffic Analysis Steps 4 Experimental Analysis 4.1 Demand Analysis of University Course Teaching Network 4.2 Experimental Indicators 4.3 Dataset Description 4.4 Experimental Results and Analysis 5 Conclusion References A Learned Multi-objective Bacterial Foraging Optimization Algorithm with Continuous Deep Q-Learning 1 Introduction 2 Pre-knowledge 2.1 Multi-objective Optimization 2.2 Bacterial Foraging Optimization 2.3 Multi-objective Bacterial Foraging Optimization 2.4 Continuous Deep Q-Learning 3 Framework of LMBFO 3.1 Model MBFO as MDP 3.2 Embedded CDQN into MBFO 4 Experiments 4.1 Performance Measures 4.2 Results and Analyses 5 Conclusions and Discussions References Webpage Text Detection Based on Improved Faster-RCNN Model 1 Introduction 2 Traditional Faster-RCNN Algorithm 2.1 Faster-RCNN Algorithm Model 2.2 Region Proposal Network 3 Improved Faster-RCNN Algorithm 3.1 Improved Faster-RCNN Algorithm Model 3.2 Residual Network Model 3.3 Regional Proposal Network Optimization 3.4 Soft-NMS Algorithm 4 Simulation Performance Testing 4.1 Dataset 4.2 Training Details 4.3 Evaluation Metrics 4.4 Evaluation of Test Results 5 Conclusion References Turbo: A High-Performance and Secure Off-Chain Payment Hub 1 Introduction 1.1 Paper Organization 2 Related Work 3 TURBO Design 3.1 Overview 3.2 Collateral-Based Leader Election 3.3 Off-Chain Transaction Execution 3.4 Challenge Mechanisms 3.5 Exit 4 Implementation and Evaluation 5 Conclusion References A Complete Information Detection Method for Vehicle CAN Network Gateway Based on Neural Network 1 Introduction 2 Design of Complete Detection Method for Vehicle CAN Network Gateway Information 2.1 Establish Vehicle CAN Network Architecture 2.2 Calculate the Information Entropy of the Vehicle CAN Network Gateway 2.3 Extraction of Vehicle CAN Network Gateway Information Features 2.4 Design a Complete Detection Algorithm of Vehicle CAN Network Gateway Information Based on Neural Network 3 Experimental Analysis 3.1 Build the Experimental Environment 3.2 Calibration Test Indicators 3.3 Analysis of Results 4 Conclusion References Optimization of Data Transmission Efficiency of Wireless Communication Network for Chemical Energy Monitoring 1 Introduction 2 Optimization of Data Transmission Efficiency of Wireless Communication Network 2.1 Flow Model Design 2.2 Radio Resource Scheduling 2.3 Data Transmission Efficiency Optimization 3 Performance Test 3.1 Building an LTE Multicast Test Environment 3.2 Network Parameter Settings 3.3 Analysis of Test Results 4 Conclusion References Deep Spatio-Temporal Decision Fusion Network for Facial Expression Recognition 1 Introduction 2 Related Works 2.1 Facial Expression Recognition 2.2 Deep FER Based on Spatio-Temporal Features 3 The Proposed Method 3.1 Temporal Feature Extraction Based on BiLSTM 3.2 Spatial Feature Extraction Based on VGG19-S 3.3 Weighted Decision Fusion 3.4 Algorithmic Description 4 Experiments and Discussion 4.1 Datasets 4.2 Data Preprocessing 4.3 Results and Analysis 5 Conclusion and Future Works References A Tabu-Based Multi-objective Particle Swarm Optimization for Irregular Flight Recovery Problem 1 Introduction 2 Model of Multi-objective Crew Recovery Problem 3 Improved Multi-objective Particle Swarm Algorithm 3.1 Primary MOPSO 3.2 Tabu-Based Multi-objective Particle Swarm Algorithm 3.3 Tests and Results 4 Encoding Scheme 5 Experiments and Results 5.1 Parameter Setting 5.2 Experiment Result 6 Conclusions and Future Directions References A Robot Foreign Object Inspection Algorithm for Transmission Line Based on Improved YOLOv5 1 Introduction 2 YOLOv5 Network Structure 3 Improvement of YOLOv5 Network Structure 3.1 Ghost Bottleneck 3.2 Coordinate Attention 3.3 Loss Function 4 Experimental Results and Comparative Analysis 4.1 Experimental Data Set 4.2 Experimental Environment 4.3 Evaluation Criterion 4.4 Comparative Experiment 5 Conclusion References Path Planning Algorithm Based on Astar Algorithm and Q-Learning Algorithm 1 Introduction 2 Astar Algorithm 2.1 Traditional Astar Algorithm 2.2 Hybrid Astar Algorithm 2.3 Simulation Experiment 3 Q-Learning Algorithm 3.1 Q-Learning Algorithm 3.2 Simulation Experiment 4 Mixed Algorithm 5 Conclusion References Belief 2 Divergence-Based Dynamical Complexity Analysis for Biological Systems 1 Introduction 2 D-S Evidence Theory and Divergence Measure 3 SEB2-Based Dynamical Complexity Analysis Algorithm for Biological Systems 4 Application 4.1 Data Description 4.2 Implement of DCA Algorithm for Biological Systems 5 Conclusion References Local Feature Acquisition Method of Multi-layer Vision Network Image Based on Virtual Reality 1 Introduction 2 Research on Local Feature Acquisition of Multi-layer Visual Network Images 2.1 Layered Reconstruction of Multi-layer Visual Network Images Based on Virtual Reality 2.2 Image Preprocessing 2.3 Realization of Image Local Feature Acquisition 3 Method Test 3.1 Sample Preparation 3.2 Image Hierarchical Reconstruction Results 3.3 Image Feature Collection Results 3.4 Evaluation Indicators 3.5 Method Test Results 4 Conclusion References Channel Selection for EEG Emotion Recognition via an Enhanced Firefly Algorithm with Brightness-Distance Attraction 1 Introduction 2 Related Work 2.1 EEG Feature Extraction and Selection 2.2 Firefly Algorithm 3 Enhanced Firefly Algorithm for Emotion Recognition 3.1 General Framework 3.2 Feature Extraction 3.3 Enhanced Firefly Algorithm 3.4 Enhanced Firefly Algorithm for Feature Selection 4 Experiments 4.1 Experimental Settings 4.2 Experimental Results 5 Conclusion References Security Risk Assessment Method of High Voltage Power Communication Network Based on Fuzzy Clustering 1 Introduction 2 Determination of Influencing Factors and Evaluation Indicators 3 High-Voltage Power Communication Network Operation Data Collection 4 Preprocessing of the Evaluation Data 5 Data Similarity Metrics 6 Implementation of Risk Assessment Based on Fuzzy Clustering 7 Experimental Comparison 8 Conclusion References Trimodal Fusion Network Combined Global-Local Feature Extraction Strategy and Spatial-Frequency Fusion Strategy 1 Introduction 2 Related Work 3 Methodology 3.1 Global Texture Module 3.2 Local Details Module 3.3 Fusion Strategy with Frequency Domain Transformation 3.4 Loss Function 4 Experiments 4.1 The Fusion of Three Input Images 4.2 Experiment on Two Input Images 4.3 Ablation Studies 5 Conclusion References Data Security Risk Prediction of Labor Relationship Rights Protection Network Platform Based on Machine Learning 1 Introduction 2 Risk Data Extraction of the Network Platform Based on Machine Learning 3 Data Security Risk Prediction of the Network Platform Based on Machine Learning 3.1 Network Platform for Protecting Labor Relations Rights and Interests 3.2 Protection of Labor Relationship Rights and Interests Data Security Risk Prediction of the Network Platform 4 Experimental Research 5 Conclusion References Research on LSTM Based Traffic Flow Prediction Adaptive Beacon Transmission Period and Power Joint Control 1 Introduction 2 Traffic Flow Prediction 3 Joint Control Algorithm 4 Simulation Experiment 4.1 Simulation Parameter Setting 4.2 Analysis of Experimental Results 5 Conclusion References Construction of Color Network Model of Folk Painting Based on Machine Learning 1 Introduction 2 Design of Color Network Model for Folk Painting 2.1 Match the Color of Folk Painting 2.2 Adjust the Color of Folk Painting 2.3 Extracting Invariant Features of Folk Painting Colors 2.4 Compensation for Color Brightness of Folk Paintings 2.5 Constructing the Color Network Model of Folk Painting 3 Case Analysis 4 Conclusion References Research on Intrusion Prevention Optimization Algorithm of Power UAV Network Communication Based on Artificial Intelligence 1 Introduction 2 Abnormal Detection of Network Communication Data of Electric UAV 2.1 Data Collection 2.2 Adaptive Filtering Processing 2.3 Abnormal Data Detection 3 Network Communication Intrusion Data Acquisition of Power UAV Based on Artificial Intelligence 4 Anti Intrusion Optimization Algorithm 4.1 Battery Optimization of Electric UAV System 4.2 Optimal Monitoring of Network Communication Intrusion Prevention for Electric UAV 5 Experimental Study 5.1 Research on Anti Intrusion Performance 5.2 Study on Practical Application Effect 6 Conclusion References Design of Network Big Data Anti Attack System for Carbon Emission Measurement Based on Deep Learning 1 Introduction 2 Design of Network Big Data Anti Attack Hardware System 2.1 Network Traffic Collector 2.2 Parallel Processor 2.3 Communication Network 2.4 Carbon Emission Measurement Network System Memory 3 Software Function Design of Network Big Data Anti Attack System 3.1 Construction of Carbon Emission Measurement Network Model 3.2 Set Network Attack Standard Characteristics 3.3 Collect Real-Time Data of Carbon Emission Measurement Network 3.4 Extracting Network Data Features Using Deep Learning Algorithm 3.5 Detecting Carbon Emissions and Measuring Cyber Attacks 3.6 Realize the Anti Attack Function of Carbon Emission Measurement Network Big Data 4 System Test 4.1 Configure System Development and Operation Environment 4.2 Prepare a Network Attack Tool for Carbon Emission Measurement 4.3 Prepare Network Data Samples 4.4 Set Operation Parameters of Deep Learning Algorithm 4.5 System Test Process and Result Analysis 5 Conclusion References An Efficient Particle YOLO Detector for Urine Sediment Detection 1 Introduction 2 Related Work 2.1 Urine Sediment Detection 2.2 Object Detection 3 Method 3.1 Overview of YOLOv5s-CBL 4 Experimental Results and Analysis 4.1 Dataset and Evaluation Metric 4.2 Baseline Methods 4.3 Implement Details 4.4 Experimental Results and Analysis 5 Conclusion References Evolutionary Factor-Driven Concise Bacterial Foraging Optimization Algorithm for Solving Customer Clustering Problems 1 Introduction 2 Background 2.1 Bacterial Foraging Optimization Algorithm 2.2 K-means Algorithm 3 The Proposed Algorithm 3.1 Evolutionary Factors 3.2 Evolutionary Factors-Driven Step Size 3.3 Evolutionary Factors-Driven Chemotaxis Operation 3.4 The Framework of EFCBFOK 4 Experiments and Analyses 4.1 Datasets and Experimental Parameters 4.2 Experimental Results and Analysis 5 Conclusion References Brain Storm Optimization Algorithm with Multiple Generation Strategies for Patient Data Clustering 1 Introduction 2 Background 2.1 Brain Storm Optimization Algorithm 2.2 K-means Clustering 3 Proposed Algorithm 3.1 Brain Storm Optimization Algorithm with Multiple Generation Strategies 3.2 Objective Functions 3.3 The Framework of BSOMGSK 4 Experimental Studies 4.1 Testing Datasets 4.2 Evaluation Indexes 4.3 Experimental Results of BSOMGSK and Its Competitors 4.4 Experimental Results of BSOMGSK and Its Variants 5 Conclusion References TGPFM: An Optimized Framework for Ordering and Transporting Raw Materials for Production 1 Introduction 2 Background 3 Methodology 3.1 Problem Definition 3.2 Supplier Supply Forecast Based on Historical Data 3.3 Ordering Scheme Model Based on Multi-objective Programming 3.4 Measuring Supplier's Importance 3.5 Prediction of Loss Rate of Transporters 3.6 Establishment of Transport Scheme Model 4 Experimental Results 4.1 Inspection Experiment of the Ordered Scheme 4.2 Prediction Accuracy Test of Transporter 4.3 Test Experiment of Transport Scheme 4.4 Comparative Experiment of Supplier Ranking Algorithm 4.5 Inspection of Supply Capacity Forecast and Ordering Scheme 5 Conclusion References Visual Analysis of Facial Expression Recognition Research Based on Knowledge Graph 1 Introduction 2 Relevant Research Basis 2.1 Facial Expression Recognition 2.2 Knowledge Graph Visualization 3 The Experimental Test 4 Conclusion References Brainstorming-Based Large Scale Neighborhood Search for Vehicle Routing with Real Travel Time 1 Introduction 2 BSO-LNS for VRPTW 2.1 Problem Description 2.2 Model Building 2.3 Coding Analysis 3 Brain Storm Optimization with Large Neighborhood Search 3.1 Brain Storm Optimization 3.2 Large Neighborhood Search 3.3 BSO-LNS 4 Experiments 4.1 Experimental Description 4.2 Experimental Setup and Analysis of Results 5 Conclusion References A SAR Image Preprocessing Algorithm Based on Improved Homomorphic Wavelet Transform and Retinex 1 Introduction 2 Retinex Image Enhancement Algorithm 3 Wavelet Transform (WT) Image Denoising Algorithm 3.1 Homomorphic Wavelet Threshold Denoising 3.2 Homomorphic Wavelet Threshold Denoising 4 Algorithm Proposed in This Paper 4.1 Improver HWT 4.2 Improver HWT Combined with Retinex Algorithm 4.3 Improver HWT Combined with Retinex Algorithm 4.4 Flow Chart of Algorithm 5 Experimental Results and Comparative Analysis 5.1 Subjective Visual Effect Analysis 5.2 Objective Quantitative Evaluation 6 Conclusion References Medical Data Clustering Based on Multi-objective Clustering Algorithm 1 Introduction 2 Methodology 2.1 Clustering Algorithms 2.2 Evaluation Metrics for Clustering Algorithms 2.3 Artificial Bee Colony Optimization Algorithm 2.4 Enhanced Multi-objective Clustering Framework with Improved ABC 3 Experiments and Results 3.1 Data Set 3.2 Experiment Settings 3.3 Experiment Results 4 Conclusion References Self-supervised Visual-Semantic Embedding Network Based on Local Label Optimization 1 Introduction 2 Related Work 2.1 Global Visual-Semantic Embedding 2.2 Local Region-Word Alignment 3 Method 3.1 Feature Extraction 3.2 Image-Text Pair Label Generation 3.3 Self-attention Module 3.4 Visual-Semantic Embedding 3.5 Loss Function 4 Experiments 4.1 Dataset and Evaluation Metric 4.2 Implementation Details 4.3 Experimental Results and Analysis 4.4 Ablation Study and Analysis 5 Conclusion References A New Deep Network Model for Stock Price Prediction 1 Introduction 2 Related Works 3 Preliminary 4 The Proposed Method 5 Experiments 5.1 Dataset Description and Pre-processing 5.2 Evaluation Functions 5.3 Results and Discussions 6 Conclusions References A Method for Residual Network Image Classification with Multi-scale Feature Fusion 1 Introduction 2 Related Research 2.1 Data Augmentation 2.2 Convolutional Neural Network 3 Methodology 3.1 RICAP 3.2 ResNet-18 3.3 FPN 4 Experimental Results and Analysis 4.1 Experimental Environment 4.2 Introduction to Datasets 4.3 Comparative Experiment 5 Conclusion References Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces 1 Introduction 2 Related Work 3 The Proposed Method 3.1 Pre-processing 3.2 Multiple Color Spaces Decomposition 3.3 Denoising Based on Bilateral Filtering 3.4 Two-Stream Neural Network Framework (TSCNN) 4 Experimental Results and Analysis 4.1 Datasets and Evaluation Criteria 4.2 Implementation Details 4.3 Experimental Results and Analysis 5 Conclusion References DU-Net: A Novel Architecture for Retinal Vessels Segmentation 1 Introduction 2 Related Works 2.1 U-Net 2.2 DenseNet 3 DU-Net Based Retinal Vessel Segmentation 3.1 Procedure of Retinal Vessel Segmentation 3.2 The Proposed DU-Net Model 4 Experimental Results and Analysis 4.1 Dataset 4.2 Evaluation Criteria 4.3 Experimental Setting 4.4 Experimental Results 5 Conclusions References Sub-pixel Level Edge Extraction Technology for Industrial Parts for Smart Manufacturing 1 Introduction 2 Preliminary 2.1 Assumptions 2.2 Description of Symbols 3 Methodology 3.1 Image Pre-processing 3.2 Improving Image Accuracy and Extracting Edge Contours 3.3 Sub-pixel Edge Profile Data Analysis 4 Experiment 4.1 Datasets 4.2 Experimental Details 4.3 Results and Analysis 5 Conclusion References USDSE: A Novel Method to Improve Service Reputation Based on Double-Side Evaluation 1 Introduction 2 USDSE Mechanism 2.1 Basic Framework 2.2 The Evaluation of Users 2.3 The Evaluation of Services 2.4 Reputation Calculation and Identification of Different Types of Users 2.5 Minimum Number of Normal Users to Get Fair Evaluation 2.6 Revenue Analysis of Employing Collusive Users 3 Experimental Evaluation 3.1 Dataset 3.2 Studies on Parameters 3.3 Malicious User Detection 3.4 Response to Service Quality Change 3.5 Revenue Analysis of Employing Malicious Collusive Users 4 Related Work 5 Conclusion References Morphology-Based Soft Label Smoothing Strategy for Fine-Grained Domain Adaptationming 1 Introduction 2 Related Work 2.1 Domain Adaptive 2.2 Self-supervised Learning 2.3 Datasets 3 FFADA Neural Network 3.1 FADA Neural Network 3.2 FFADA Neural Network 4 Experiment 5 Conclusion References MOOC Performance Prediction and Online Design Instructional Suggestions Based on LightGBM 1 Introduction 2 Related Research 2.1 MOOC Performance Prediction 2.2 Analysis of Relevant Factors Affecting the Prediction Results of Online Performance 2.3 Lack of Recommendations for Instructional Organizers at the End of Online Performance Prediction 3 Construction of MOOC Learning Performance Prediction Model Based on LightGBM 3.1 Introduction to the Experimental Data Set 3.2 Preprocessing of the Dataset 3.3 Construction of MOOC Performance Prediction Model Based on LightGBM 4 Experimental Results 4.1 Experimental Setup 4.2 Experimental Results 5 Suggestions for Online Instructional Design Based on Experimental Results 5.1 Different Instructional Designs for Learners in Different External Environments 5.2 Different Online Instructional Designs for Learners with Different Pre-existing Cognitive Structures References MOOC Dropout Prediction Based on Bayesian Network 1 Introduction 2 Related Work 2.1 Current Status of Foreign Dropout Prediction Research 2.2 Current Status of Dropout Prediction Research in China 3 Data Preprocessing 3.1 Dataset Description 3.2 Data Preprocessing 4 Construction of a Dropout Prediction Model 4.1 Feature Selection 4.2 Structural Learning 4.3 Parameter Calculation 4.4 Model-Based Dropout Prediction 5 Experiment 5.1 Experiment Setup 5.2 Experimental Results 6 Conclusion References Knowledge Enhanced BERT Based on Corpus Associate Generation 1 Introduction 2 Corpus Associate Generation Based Knowledge Enhanced BERT 2.1 Symbol Definition 2.2 Model Overview 2.3 Corpus Associate Generation Method for Knowledge Injection 2.4 Transformer and Embedding Layer 2.5 Time Complexity Analysis 3 Experiment and Analysis 3.1 Experimental Data Set 3.2 Baseline and Experimental Environment 3.3 Evaluation Metrics 3.4 Experimental Results and Analysis 3.5 Ablation Experiments 4 Conclusion References Multi-objective Particle Swarm Optimization Based on Archive Control Strategy 1 Introduction 2 Related Work 2.1 Multi-objective Optimization 2.2 Particle Swarm Optimization 3 Multi-objective Particle Swarm Optimization Based on Archive Control Strategy 3.1 Specific Steps of the ACMOPSO 3.2 Novel Velocity Update Strategy 3.3 External Archive Control Strategy 4 Numerical Experiment Results and Analysis 4.1 Test Functions and Parameter Settings 4.2 Performance Index 4.3 Numerical Comparison Results of Algorithms 5 Conclusion References A Hybrid Multi-objective Genetic-Particle Swarm Optimization Algorithm for Airline Crew Rostering Problem with Fairness and Satisfaction 1 Introduction 2 Problem Definition and Formulation 2.1 Notations 2.2 Problem Description 2.3 Objective Formulation 2.4 Constraints Formulation 3 Proposed Algorithm for Solving CRP 3.1 Algorithm Flow of NSGA-II 3.2 Proposed Algorithm 3.3 Coding 4 Experiments and Comparisons 4.1 Experimental Settings 4.2 Experimental Results 5 Conclusion References Plant Leaf Area Measurement Using 3D Imaging: A Comparative Study Between Dynamic Structured Light Stereo and Time-of-Flight 1 Introduction 2 Methods 2.1 Dynamic Structured Light Stereo Imaging 2.2 Image Acquisition and Leaf Samples 2.3 Joint Point Cloud Segmentation and Repairing 2.4 Leaf Area Calculation 3 Results 3.1 Dummy Leaves 3.2 Real Plant Leaves 4 Discussions 5 Conclusion References Subgraph Matching Based on Path Adaptation for Large-Scale Graph 1 Introduction 2 Subgraph Matching Algorithm Based on Path Adaptation 2.1 Subgraph Matching 2.2 Path Adaptation 2.3 Subgraph Matching Algorithm 3 Experimental Results and Analysis 4 Conclusion References Photovoltaic Panel Intelligent Management and Identification Detection System Based on YOLOv5 1 Introduction 1.1 A Subsection Sample 2 Related Work 2.1 Object Detection 2.2 YOLO Model 3 Design 3.1 Demand Module Description 3.2 System Structure 4 Testing and Verification 4.1 Implementation Personnel Information Association Module 4.2 Implementation of Visiting Information Association Module 5 Conclusion References Image Encryption Algorithm Based on a New Five-Dimensional Lorenz System 1 Introduction 2 New Five-Dimensional Hyperchaotic Lorenz System 3 Digital Image Encryption Algorithm is Based on the New Five-Dimensional Hyperchaotic Lorenz System 4 Encryption Algorithm Security Analysis and Experimental Simulation 4.1 Histogram Analysis 4.2 Algorithm Key Sensitivity Testing and Analysis 4.3 Key Space Analysis 4.4 Neighborhood Pixel Correlation Analysis 5 Conclusion References Research on the Construction of an Accurate Procurement System for Library e-Resources in Foreign Language Under Dig Data Analysis 1 Introduction 2 Related Technologies 2.1 Machine Learning 2.2 Text Classification 2.3 Cross-Validation 2.4 Model Evaluation Criteria 3 The Construction Process of Accurate Book Purchasing Model 4 Experiments and Results Analysis 4.1 Data Pre-processing 4.2 Feature Engineering 4.3 Model Performance Evaluation 5 Conclusion References Recognition Method of Wa Language Isolated Words Based on Convolutional Neural Network 1 Introduction 2 Related Work 3 Model 3.1 Extraction of Fbank Features 3.2 Deep CNN 3.3 CTC 4 Experimental Results 4.1 Dataset 4.2 Experiments 5 Conclusions References Binding Number and Fractional (k,m)-Covered Graph 1 Introduction 2 Preliminary Results 3 Proof of Main Theorems 3.1 Proof of Theorem 1 3.2 Proof of Theorem 2 4 Sharpness 5 Correct Counterexample in Ma and Liu ch50fractionalkfactor 6 Sun Toughness and Path Factor Critical Covered Graphs 7 Conclusion References Domination Based Federated Learning Algorithm 1 Introduction 2 Literature Review 3 Setting 3.1 Preliminary in Graph Theory 3.2 Decentralized Federated Learning Framework 4 Main Algorithm Description 5 Conclusion References Structured Representation of Fuzzy Data by Bipolar Fuzzy Hypergraphs 1 Introduction 2 Background 3 Bipolar Pythagorean Fuzzy Hypergraphs 4 Examples References Deep Knowledge Tracing with GRU and Learning State Enhancement 1 Introduction 2 Related Work 3 Model 3.1 Review of Deep Knowledge Tracing Model 3.2 DKT Model Improvement Framework 4 Experiments 5 Conclusion References Author Index