ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III

دانلود کتاب یادگیری ماشین برای امنیت سایبری: چهارمین کنفرانس بین المللی، ML4CS 2022، گوانگژو، چین، 2 تا 4 دسامبر 2022، مجموعه مقالات، قسمت سوم

Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III

مشخصات کتاب

Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III

ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Computer Science, 13657 
ISBN (شابک) : 3031201019, 9783031201011 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 706
[707] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 55 Mb 

قیمت کتاب (تومان) : 58,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 1


در صورت تبدیل فایل کتاب Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب یادگیری ماشین برای امنیت سایبری: چهارمین کنفرانس بین المللی، ML4CS 2022، گوانگژو، چین، 2 تا 4 دسامبر 2022، مجموعه مقالات، قسمت سوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب یادگیری ماشین برای امنیت سایبری: چهارمین کنفرانس بین المللی، ML4CS 2022، گوانگژو، چین، 2 تا 4 دسامبر 2022، مجموعه مقالات، قسمت سوم

 مجموعه مقالات سه جلدی LNCS 13655,13656 و 13657، مجموعه داوری چهارمین کنفرانس بین المللی یادگیری ماشین برای امنیت سایبری، ML4CS 2022 است که در 2 تا 4 دسامبر 2022 در گوانگژو، چین برگزار شد.
100 مقاله کامل و 46 مقاله کوتاه که در این مجموعه مقالات گنجانده شده بودند، با دقت بررسی و از بین 367 مقاله ارسالی انتخاب شدند.


توضیحاتی درمورد کتاب به خارجی

The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereedproceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2–4, 2022, held in Guangzhou, China.
The 100 full papers and 46 short papers were included in these proceedings were carefully reviewed and selected from 367 submissions.



فهرست مطالب

Preface
Organization
Contents – Part III
Design of Active Defense System for Railway Communication Network Based on Deep Neural Network
	1 Introduction
	2 Hardware Design of Active Defense System for Railway Communication Network
		2.1 Design Railway Communication Network Monitoring Terminal
		2.2 Design Railway Communication Network Alarm
		2.3 Designing a Railway Communication Network Intrusion Data Parser
		2.4 Design the Active Defense Circuit of Railway Communication Network
	3 Software Design of Active Defense System for Railway Communication Network
		3.1 Collecting Spatial Data of Railway Communication Network
		3.2 Extraction of Railway Communication Network Intrusion Data Features Based on Deep Neural Network
		3.3 Constructing the Active Defense Model of Railway Communication Network
	4 Test Analysis
		4.1 Test Plan
		4.2 Functional Testing
		4.3 Performance Test
	5 Conclusion
	References
Human Resource Network Information Recommendation Method Based on Machine Learning
	1 Introduction
	2 Filtering Based on Machine Learning Information
	3 Human Resource Network Information Recommendation Based on Machine Learning
		3.1 Construction of Time-Series Behavior Preference Features
		3.2 Data Preprocessing
		3.3 Human Resource Network Information Recommendation Process
	4 Experiments
		4.1 Experimental Setup
		4.2 Experimental Indicators
		4.3 Analysis of the Effectiveness of Information Collection
		4.4 Experimental Results and Analysis
	5 Conclusion
	References
Machine Learning Based Abnormal Flow Analysis of University Course Teaching Network
	1 Introduction
	2 Construction of Network Traffic Identification Model Based on Machine Learning
	3 Traffic Analysis of University Course Teaching Network Based on Machine Learning
		3.1 Data Screening
		3.2 Model Training
		3.3 Design of Network Traffic Analysis Steps
	4 Experimental Analysis
		4.1 Demand Analysis of University Course Teaching Network
		4.2 Experimental Indicators
		4.3 Dataset Description
		4.4 Experimental Results and Analysis
	5 Conclusion
	References
A Learned Multi-objective Bacterial Foraging Optimization Algorithm with Continuous Deep Q-Learning
	1 Introduction
	2 Pre-knowledge
		2.1 Multi-objective Optimization
		2.2 Bacterial Foraging Optimization
		2.3 Multi-objective Bacterial Foraging Optimization
		2.4 Continuous Deep Q-Learning
	3 Framework of LMBFO
		3.1 Model MBFO as MDP
		3.2 Embedded CDQN into MBFO
	4 Experiments
		4.1 Performance Measures
		4.2 Results and Analyses
	5 Conclusions and Discussions
	References
Webpage Text Detection Based on Improved Faster-RCNN Model
	1 Introduction
	2 Traditional Faster-RCNN Algorithm
		2.1 Faster-RCNN Algorithm Model
		2.2 Region Proposal Network
	3 Improved Faster-RCNN Algorithm
		3.1 Improved Faster-RCNN Algorithm Model
		3.2 Residual Network Model
		3.3 Regional Proposal Network Optimization
		3.4 Soft-NMS Algorithm
	4 Simulation Performance Testing
		4.1 Dataset
		4.2 Training Details
		4.3 Evaluation Metrics
		4.4 Evaluation of Test Results
	5 Conclusion
	References
Turbo: A High-Performance and Secure Off-Chain Payment Hub
	1 Introduction
		1.1 Paper Organization
	2 Related Work
	3 TURBO Design
		3.1 Overview
		3.2 Collateral-Based Leader Election
		3.3 Off-Chain Transaction Execution
		3.4 Challenge Mechanisms
		3.5 Exit
	4 Implementation and Evaluation
	5 Conclusion
	References
A Complete Information Detection Method for Vehicle CAN Network Gateway Based on Neural Network
	1 Introduction
	2 Design of Complete Detection Method for Vehicle CAN Network Gateway Information
		2.1 Establish Vehicle CAN Network Architecture
		2.2 Calculate the Information Entropy of the Vehicle CAN Network Gateway
		2.3 Extraction of Vehicle CAN Network Gateway Information Features
		2.4 Design a Complete Detection Algorithm of Vehicle CAN Network Gateway Information Based on Neural Network
	3 Experimental Analysis
		3.1 Build the Experimental Environment
		3.2 Calibration Test Indicators
		3.3 Analysis of Results
	4 Conclusion
	References
Optimization of Data Transmission Efficiency of Wireless Communication Network for Chemical Energy Monitoring
	1 Introduction
	2 Optimization of Data Transmission Efficiency of Wireless Communication Network
		2.1 Flow Model Design
		2.2 Radio Resource Scheduling
		2.3 Data Transmission Efficiency Optimization
	3 Performance Test
		3.1 Building an LTE Multicast Test Environment
		3.2 Network Parameter Settings
		3.3 Analysis of Test Results
	4 Conclusion
	References
Deep Spatio-Temporal Decision Fusion Network for Facial Expression Recognition
	1 Introduction
	2 Related Works
		2.1 Facial Expression Recognition
		2.2 Deep FER Based on Spatio-Temporal Features
	3 The Proposed Method
		3.1 Temporal Feature Extraction Based on BiLSTM
		3.2 Spatial Feature Extraction Based on VGG19-S
		3.3 Weighted Decision Fusion
		3.4 Algorithmic Description
	4 Experiments and Discussion
		4.1 Datasets
		4.2 Data Preprocessing
		4.3 Results and Analysis
	5 Conclusion and Future Works
	References
A Tabu-Based Multi-objective Particle Swarm Optimization for Irregular Flight Recovery Problem
	1 Introduction
	2 Model of Multi-objective Crew Recovery Problem
	3 Improved Multi-objective Particle Swarm Algorithm
		3.1 Primary MOPSO
		3.2 Tabu-Based Multi-objective Particle Swarm Algorithm
		3.3 Tests and Results
	4 Encoding Scheme
	5 Experiments and Results
		5.1 Parameter Setting
		5.2 Experiment Result
	6 Conclusions and Future Directions
	References
A Robot Foreign Object Inspection Algorithm for Transmission Line Based on Improved YOLOv5
	1 Introduction
	2 YOLOv5 Network Structure
	3 Improvement of YOLOv5 Network Structure
		3.1 Ghost Bottleneck
		3.2 Coordinate Attention
		3.3 Loss Function
	4 Experimental Results and Comparative Analysis
		4.1 Experimental Data Set
		4.2 Experimental Environment
		4.3 Evaluation Criterion
		4.4 Comparative Experiment
	5 Conclusion
	References
Path Planning Algorithm Based on Astar Algorithm and Q-Learning Algorithm
	1 Introduction
	2 Astar Algorithm
		2.1 Traditional Astar Algorithm
		2.2 Hybrid Astar Algorithm
		2.3 Simulation Experiment
	3 Q-Learning Algorithm
		3.1 Q-Learning Algorithm
		3.2 Simulation Experiment
	4 Mixed Algorithm
	5 Conclusion
	References
Belief 2 Divergence-Based Dynamical Complexity Analysis for Biological Systems
	1 Introduction
	2 D-S Evidence Theory and Divergence Measure
	3 SEB2-Based Dynamical Complexity Analysis Algorithm for Biological Systems
	4 Application
		4.1 Data Description
		4.2 Implement of DCA Algorithm for Biological Systems
	5 Conclusion
	References
Local Feature Acquisition Method of Multi-layer Vision Network Image Based on Virtual Reality
	1 Introduction
	2 Research on Local Feature Acquisition of Multi-layer Visual Network Images
		2.1 Layered Reconstruction of Multi-layer Visual Network Images Based on Virtual Reality
		2.2 Image Preprocessing
		2.3 Realization of Image Local Feature Acquisition
	3 Method Test
		3.1 Sample Preparation
		3.2 Image Hierarchical Reconstruction Results
		3.3 Image Feature Collection Results
		3.4 Evaluation Indicators
		3.5 Method Test Results
	4 Conclusion
	References
Channel Selection for EEG Emotion Recognition via an Enhanced Firefly Algorithm with Brightness-Distance Attraction
	1 Introduction
	2 Related Work
		2.1 EEG Feature Extraction and Selection
		2.2 Firefly Algorithm
	3 Enhanced Firefly Algorithm for Emotion Recognition
		3.1 General Framework
		3.2 Feature Extraction
		3.3 Enhanced Firefly Algorithm
		3.4 Enhanced Firefly Algorithm for Feature Selection
	4 Experiments
		4.1 Experimental Settings
		4.2 Experimental Results
	5 Conclusion
	References
Security Risk Assessment Method of High Voltage Power Communication Network Based on Fuzzy Clustering
	1 Introduction
	2 Determination of Influencing Factors and Evaluation Indicators
	3 High-Voltage Power Communication Network Operation Data Collection
	4 Preprocessing of the Evaluation Data
	5 Data Similarity Metrics
	6 Implementation of Risk Assessment Based on Fuzzy Clustering
	7 Experimental Comparison
	8 Conclusion
	References
Trimodal Fusion Network Combined Global-Local Feature Extraction Strategy and Spatial-Frequency Fusion Strategy
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Global Texture Module
		3.2 Local Details Module
		3.3 Fusion Strategy with Frequency Domain Transformation
		3.4 Loss Function
	4 Experiments
		4.1 The Fusion of Three Input Images
		4.2 Experiment on Two Input Images
		4.3 Ablation Studies
	5 Conclusion
	References
Data Security Risk Prediction of Labor Relationship Rights Protection Network Platform Based on Machine Learning
	1 Introduction
	2 Risk Data Extraction of the Network Platform Based on Machine Learning
	3 Data Security Risk Prediction of the Network Platform Based on Machine Learning
		3.1 Network Platform for Protecting Labor Relations Rights and Interests
		3.2 Protection of Labor Relationship Rights and Interests Data Security Risk Prediction of the Network Platform
	4 Experimental Research
	5 Conclusion
	References
Research on LSTM Based Traffic Flow Prediction Adaptive Beacon Transmission Period and Power Joint Control
	1 Introduction
	2 Traffic Flow Prediction
	3 Joint Control Algorithm
	4 Simulation Experiment
		4.1 Simulation Parameter Setting
		4.2 Analysis of Experimental Results
	5 Conclusion
	References
Construction of Color Network Model of Folk Painting Based on Machine Learning
	1 Introduction
	2 Design of Color Network Model for Folk Painting
		2.1 Match the Color of Folk Painting
		2.2 Adjust the Color of Folk Painting
		2.3 Extracting Invariant Features of Folk Painting Colors
		2.4 Compensation for Color Brightness of Folk Paintings
		2.5 Constructing the Color Network Model of Folk Painting
	3 Case Analysis
	4 Conclusion
	References
Research on Intrusion Prevention Optimization Algorithm of Power UAV Network Communication Based on Artificial Intelligence
	1 Introduction
	2 Abnormal Detection of Network Communication Data of Electric UAV
		2.1 Data Collection
		2.2 Adaptive Filtering Processing
		2.3 Abnormal Data Detection
	3 Network Communication Intrusion Data Acquisition of Power UAV Based on Artificial Intelligence
	4 Anti Intrusion Optimization Algorithm
		4.1 Battery Optimization of Electric UAV System
		4.2 Optimal Monitoring of Network Communication Intrusion Prevention for Electric UAV
	5 Experimental Study
		5.1 Research on Anti Intrusion Performance
		5.2 Study on Practical Application Effect
	6 Conclusion
	References
Design of Network Big Data Anti Attack System for Carbon Emission Measurement Based on Deep Learning
	1 Introduction
	2 Design of Network Big Data Anti Attack Hardware System
		2.1 Network Traffic Collector
		2.2 Parallel Processor
		2.3 Communication Network
		2.4 Carbon Emission Measurement Network System Memory
	3 Software Function Design of Network Big Data Anti Attack System
		3.1 Construction of Carbon Emission Measurement Network Model
		3.2 Set Network Attack Standard Characteristics
		3.3 Collect Real-Time Data of Carbon Emission Measurement Network
		3.4 Extracting Network Data Features Using Deep Learning Algorithm
		3.5 Detecting Carbon Emissions and Measuring Cyber Attacks
		3.6 Realize the Anti Attack Function of Carbon Emission Measurement Network Big Data
	4 System Test
		4.1 Configure System Development and Operation Environment
		4.2 Prepare a Network Attack Tool for Carbon Emission Measurement
		4.3 Prepare Network Data Samples
		4.4 Set Operation Parameters of Deep Learning Algorithm
		4.5 System Test Process and Result Analysis
	5 Conclusion
	References
An Efficient Particle YOLO Detector for Urine Sediment Detection
	1 Introduction
	2 Related Work
		2.1 Urine Sediment Detection
		2.2 Object Detection
	3 Method
		3.1 Overview of YOLOv5s-CBL
	4 Experimental Results and Analysis
		4.1 Dataset and Evaluation Metric
		4.2 Baseline Methods
		4.3 Implement Details
		4.4 Experimental Results and Analysis
	5 Conclusion
	References
Evolutionary Factor-Driven Concise Bacterial Foraging Optimization Algorithm for Solving Customer Clustering Problems
	1 Introduction
	2 Background
		2.1 Bacterial Foraging Optimization Algorithm
		2.2 K-means Algorithm
	3 The Proposed Algorithm
		3.1 Evolutionary Factors
		3.2 Evolutionary Factors-Driven Step Size
		3.3 Evolutionary Factors-Driven Chemotaxis Operation
		3.4 The Framework of EFCBFOK
	4 Experiments and Analyses
		4.1 Datasets and Experimental Parameters
		4.2 Experimental Results and Analysis
	5 Conclusion
	References
Brain Storm Optimization Algorithm with Multiple Generation Strategies for Patient Data Clustering
	1 Introduction
	2 Background
		2.1 Brain Storm Optimization Algorithm
		2.2 K-means Clustering
	3 Proposed Algorithm
		3.1 Brain Storm Optimization Algorithm with Multiple Generation Strategies
		3.2 Objective Functions
		3.3 The Framework of BSOMGSK
	4 Experimental Studies
		4.1 Testing Datasets
		4.2 Evaluation Indexes
		4.3 Experimental Results of BSOMGSK and Its Competitors
		4.4 Experimental Results of BSOMGSK and Its Variants
	5 Conclusion
	References
TGPFM: An Optimized Framework for Ordering and Transporting Raw Materials for Production
	1 Introduction
	2 Background
	3 Methodology
		3.1 Problem Definition
		3.2 Supplier Supply Forecast Based on Historical Data
		3.3 Ordering Scheme Model Based on Multi-objective Programming
		3.4 Measuring Supplier's Importance
		3.5 Prediction of Loss Rate of Transporters
		3.6 Establishment of Transport Scheme Model
	4 Experimental Results
		4.1 Inspection Experiment of the Ordered Scheme
		4.2 Prediction Accuracy Test of Transporter
		4.3 Test Experiment of Transport Scheme
		4.4 Comparative Experiment of Supplier Ranking Algorithm
		4.5 Inspection of Supply Capacity Forecast and Ordering Scheme
	5 Conclusion
	References
Visual Analysis of Facial Expression Recognition Research Based on Knowledge Graph
	1 Introduction
	2 Relevant Research Basis
		2.1 Facial Expression Recognition
		2.2 Knowledge Graph Visualization
	3 The Experimental Test
	4 Conclusion
	References
Brainstorming-Based Large Scale Neighborhood Search for Vehicle Routing with Real Travel Time
	1 Introduction
	2 BSO-LNS for VRPTW
		2.1 Problem Description
		2.2 Model Building
		2.3 Coding Analysis
	3 Brain Storm Optimization with Large Neighborhood Search
		3.1 Brain Storm Optimization
		3.2 Large Neighborhood Search
		3.3 BSO-LNS
	4 Experiments
		4.1 Experimental Description
		4.2 Experimental Setup and Analysis of Results
	5 Conclusion
	References
A SAR Image Preprocessing Algorithm Based on Improved Homomorphic Wavelet Transform and Retinex
	1 Introduction
	2 Retinex Image Enhancement Algorithm
	3 Wavelet Transform (WT) Image Denoising Algorithm
		3.1 Homomorphic Wavelet Threshold Denoising
		3.2 Homomorphic Wavelet Threshold Denoising
	4 Algorithm Proposed in This Paper
		4.1 Improver HWT
		4.2 Improver HWT Combined with Retinex Algorithm
		4.3 Improver HWT Combined with Retinex Algorithm
		4.4 Flow Chart of Algorithm
	5 Experimental Results and Comparative Analysis
		5.1 Subjective Visual Effect Analysis
		5.2 Objective Quantitative Evaluation
	6 Conclusion
	References
Medical Data Clustering Based on Multi-objective Clustering Algorithm
	1 Introduction
	2 Methodology
		2.1 Clustering Algorithms
		2.2 Evaluation Metrics for Clustering Algorithms
		2.3 Artificial Bee Colony Optimization Algorithm
		2.4 Enhanced Multi-objective Clustering Framework with Improved ABC
	3 Experiments and Results
		3.1 Data Set
		3.2 Experiment Settings
		3.3 Experiment Results
	4 Conclusion
	References
Self-supervised Visual-Semantic Embedding Network Based on Local Label Optimization
	1 Introduction
	2 Related Work
		2.1 Global Visual-Semantic Embedding
		2.2 Local Region-Word Alignment
	3 Method
		3.1 Feature Extraction
		3.2 Image-Text Pair Label Generation
		3.3 Self-attention Module
		3.4 Visual-Semantic Embedding
		3.5 Loss Function
	4 Experiments
		4.1 Dataset and Evaluation Metric
		4.2 Implementation Details
		4.3 Experimental Results and Analysis
		4.4 Ablation Study and Analysis
	5 Conclusion
	References
A New Deep Network Model for Stock Price Prediction
	1 Introduction
	2 Related Works
	3 Preliminary
	4 The Proposed Method
	5 Experiments
		5.1 Dataset Description and Pre-processing
		5.2 Evaluation Functions
		5.3 Results and Discussions
	6 Conclusions
	References
A Method for Residual Network Image Classification with Multi-scale Feature Fusion
	1 Introduction
	2 Related Research
		2.1 Data Augmentation
		2.2 Convolutional Neural Network
	3 Methodology
		3.1 RICAP
		3.2 ResNet-18
		3.3 FPN
	4 Experimental Results and Analysis
		4.1 Experimental Environment
		4.2 Introduction to Datasets
		4.3 Comparative Experiment
	5 Conclusion
	References
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces
	1 Introduction
	2 Related Work
	3 The Proposed Method
		3.1 Pre-processing
		3.2 Multiple Color Spaces Decomposition
		3.3 Denoising Based on Bilateral Filtering
		3.4 Two-Stream Neural Network Framework (TSCNN)
	4 Experimental Results and Analysis
		4.1 Datasets and Evaluation Criteria
		4.2 Implementation Details
		4.3 Experimental Results and Analysis
	5 Conclusion
	References
DU-Net: A Novel Architecture for Retinal Vessels Segmentation
	1 Introduction
	2 Related Works
		2.1 U-Net
		2.2 DenseNet
	3 DU-Net Based Retinal Vessel Segmentation
		3.1 Procedure of Retinal Vessel Segmentation
		3.2 The Proposed DU-Net Model
	4 Experimental Results and Analysis
		4.1 Dataset
		4.2 Evaluation Criteria
		4.3 Experimental Setting
		4.4 Experimental Results
	5 Conclusions
	References
Sub-pixel Level Edge Extraction Technology for Industrial Parts for Smart Manufacturing
	1 Introduction
	2 Preliminary
		2.1 Assumptions
		2.2 Description of Symbols
	3 Methodology
		3.1 Image Pre-processing
		3.2 Improving Image Accuracy and Extracting Edge Contours
		3.3 Sub-pixel Edge Profile Data Analysis
	4 Experiment
		4.1 Datasets
		4.2 Experimental Details
		4.3 Results and Analysis
	5 Conclusion
	References
USDSE: A Novel Method to Improve Service Reputation Based on Double-Side Evaluation
	1 Introduction
	2 USDSE Mechanism
		2.1 Basic Framework
		2.2 The Evaluation of Users
		2.3 The Evaluation of Services
		2.4 Reputation Calculation and Identification of Different Types of Users
		2.5 Minimum Number of Normal Users to Get Fair Evaluation
		2.6 Revenue Analysis of Employing Collusive Users
	3 Experimental Evaluation
		3.1 Dataset
		3.2 Studies on Parameters
		3.3 Malicious User Detection
		3.4 Response to Service Quality Change
		3.5 Revenue Analysis of Employing Malicious Collusive Users
	4 Related Work
	5 Conclusion
	References
Morphology-Based Soft Label Smoothing Strategy for Fine-Grained Domain Adaptationming
	1 Introduction
	2 Related Work
		2.1 Domain Adaptive
		2.2 Self-supervised Learning
		2.3 Datasets
	3 FFADA Neural Network
		3.1 FADA Neural Network
		3.2 FFADA Neural Network
	4 Experiment
	5 Conclusion
	References
MOOC Performance Prediction and Online Design Instructional Suggestions Based on LightGBM
	1 Introduction
	2 Related Research
		2.1 MOOC Performance Prediction
		2.2 Analysis of Relevant Factors Affecting the Prediction Results of Online Performance
		2.3 Lack of Recommendations for Instructional Organizers at the End of Online Performance Prediction
	3 Construction of MOOC Learning Performance Prediction Model Based on LightGBM
		3.1 Introduction to the Experimental Data Set
		3.2 Preprocessing of the Dataset
		3.3 Construction of MOOC Performance Prediction Model Based on LightGBM
	4 Experimental Results
		4.1 Experimental Setup
		4.2 Experimental Results
	5 Suggestions for Online Instructional Design Based on Experimental Results
		5.1 Different Instructional Designs for Learners in Different External Environments
		5.2 Different Online Instructional Designs for Learners with Different Pre-existing Cognitive Structures
	References
MOOC Dropout Prediction Based on Bayesian Network
	1 Introduction
	2 Related Work
		2.1 Current Status of Foreign Dropout Prediction Research
		2.2 Current Status of Dropout Prediction Research in China
	3 Data Preprocessing
		3.1 Dataset Description
		3.2 Data Preprocessing
	4 Construction of a Dropout Prediction Model
		4.1 Feature Selection
		4.2 Structural Learning
		4.3 Parameter Calculation
		4.4 Model-Based Dropout Prediction
	5 Experiment
		5.1 Experiment Setup
		5.2 Experimental Results
	6 Conclusion
	References
Knowledge Enhanced BERT Based on Corpus Associate Generation
	1 Introduction
	2 Corpus Associate Generation Based Knowledge Enhanced BERT
		2.1 Symbol Definition
		2.2 Model Overview
		2.3 Corpus Associate Generation Method for Knowledge Injection
		2.4 Transformer and Embedding Layer
		2.5 Time Complexity Analysis
	3 Experiment and Analysis
		3.1 Experimental Data Set
		3.2 Baseline and Experimental Environment
		3.3 Evaluation Metrics
		3.4 Experimental Results and Analysis
		3.5 Ablation Experiments
	4 Conclusion
	References
Multi-objective Particle Swarm Optimization Based on Archive Control Strategy
	1 Introduction
	2 Related Work
		2.1 Multi-objective Optimization
		2.2 Particle Swarm Optimization
	3 Multi-objective Particle Swarm Optimization Based on Archive Control Strategy
		3.1 Specific Steps of the ACMOPSO
		3.2 Novel Velocity Update Strategy
		3.3 External Archive Control Strategy
	4 Numerical Experiment Results and Analysis
		4.1 Test Functions and Parameter Settings
		4.2 Performance Index
		4.3 Numerical Comparison Results of Algorithms
	5 Conclusion
	References
A Hybrid Multi-objective Genetic-Particle Swarm Optimization Algorithm for Airline Crew Rostering Problem with Fairness and Satisfaction
	1 Introduction
	2 Problem Definition and Formulation
		2.1 Notations
		2.2 Problem Description
		2.3 Objective Formulation
		2.4 Constraints Formulation
	3 Proposed Algorithm for Solving CRP
		3.1 Algorithm Flow of NSGA-II
		3.2 Proposed Algorithm
		3.3 Coding
	4 Experiments and Comparisons
		4.1 Experimental Settings
		4.2 Experimental Results
	5 Conclusion
	References
Plant Leaf Area Measurement Using 3D Imaging: A Comparative Study Between Dynamic Structured Light Stereo and Time-of-Flight
	1 Introduction
	2 Methods
		2.1 Dynamic Structured Light Stereo Imaging
		2.2 Image Acquisition and Leaf Samples
		2.3 Joint Point Cloud Segmentation and Repairing
		2.4 Leaf Area Calculation
	3 Results
		3.1 Dummy Leaves
		3.2 Real Plant Leaves
	4 Discussions
	5 Conclusion
	References
Subgraph Matching Based on Path Adaptation for Large-Scale Graph
	1 Introduction
	2 Subgraph Matching Algorithm Based on Path Adaptation
		2.1 Subgraph Matching
		2.2 Path Adaptation
		2.3 Subgraph Matching Algorithm
	3 Experimental Results and Analysis
	4 Conclusion
	References
Photovoltaic Panel Intelligent Management and Identification Detection System Based on YOLOv5
	1 Introduction
		1.1 A Subsection Sample
	2 Related Work
		2.1 Object Detection
		2.2 YOLO Model
	3 Design
		3.1 Demand Module Description
		3.2 System Structure
	4 Testing and Verification
		4.1 Implementation Personnel Information Association Module
		4.2 Implementation of Visiting Information Association Module
	5 Conclusion
	References
Image Encryption Algorithm Based on a New Five-Dimensional Lorenz System
	1 Introduction
	2 New Five-Dimensional Hyperchaotic Lorenz System
	3 Digital Image Encryption Algorithm is Based on the New Five-Dimensional Hyperchaotic Lorenz System
	4 Encryption Algorithm Security Analysis and Experimental Simulation
		4.1 Histogram Analysis
		4.2 Algorithm Key Sensitivity Testing and Analysis
		4.3 Key Space Analysis
		4.4 Neighborhood Pixel Correlation Analysis
	5 Conclusion
	References
Research on the Construction of an Accurate Procurement System for Library e-Resources in Foreign Language Under Dig Data Analysis
	1 Introduction
	2 Related Technologies
		2.1 Machine Learning
		2.2 Text Classification
		2.3 Cross-Validation
		2.4 Model Evaluation Criteria
	3 The Construction Process of Accurate Book Purchasing Model
	4 Experiments and Results Analysis
		4.1 Data Pre-processing
		4.2 Feature Engineering
		4.3 Model Performance Evaluation
	5 Conclusion
	References
Recognition Method of Wa Language Isolated Words Based on Convolutional Neural Network
	1 Introduction
	2 Related Work
	3 Model
		3.1 Extraction of Fbank Features
		3.2 Deep CNN
		3.3 CTC
	4 Experimental Results
		4.1 Dataset
		4.2 Experiments
	5 Conclusions
	References
Binding Number and Fractional (k,m)-Covered Graph
	1 Introduction
	2 Preliminary Results
	3 Proof of Main Theorems
		3.1 Proof of Theorem 1
		3.2 Proof of Theorem 2
	4 Sharpness
	5 Correct Counterexample in Ma and Liu ch50fractionalkfactor
	6 Sun Toughness and Path Factor Critical Covered Graphs
	7 Conclusion
	References
Domination Based Federated Learning Algorithm
	1 Introduction
	2 Literature Review
	3 Setting
		3.1 Preliminary in Graph Theory
		3.2 Decentralized Federated Learning Framework
	4 Main Algorithm Description
	5 Conclusion
	References
Structured Representation of Fuzzy Data by Bipolar Fuzzy Hypergraphs
	1 Introduction
	2 Background
	3 Bipolar Pythagorean Fuzzy Hypergraphs
	4 Examples
	References
Deep Knowledge Tracing with GRU and Learning State Enhancement
	1 Introduction
	2 Related Work
	3 Model
		3.1 Review of Deep Knowledge Tracing Model
		3.2 DKT Model Improvement Framework
	4 Experiments
	5 Conclusion
	References
Author Index




نظرات کاربران