Advances in Artificial Intelligence and Security: 7th International Conference, Icais 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II » książka
Artificial Intelligence.- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems.- The identification of slope crack based on convolutional neural network.- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function.- Experiments of Federated Learning for COVID-19 Chest X-ray Images.- A Novel Network Covert Channel Model based on Blockchain Transaction Parity.- An Improved CNN Model for Fast Salient Object Detection.- Control system design of transport Robot based on Multi-color Recognition.- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems.- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues.- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization.- Big Data.- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors.- Application of non-negative matrix factorization in fault detection of distribution network.- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory.- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain.- The Implementation of Aeronautical Information Exchange Model in SWIM.- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image.- Research on the Application of Big Data Analysis in University Library.- Research on Support Vector Machine in Traffic Detection Algorithm.- Application Research on Crop Straw Biomass Waste in Logistics Packaging System.- Research On Data Analysis To Improve English Vocabulary Learning Performance.- Hungarian Method in a car-sharing system application research.- Network Topology Discovery Based on Classification Algorithm.- Research on Feature Words for IoT Device Recognition Based on Word2vec.- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter.- Application of Grey Forecasting Model to CPI Index Forecast.- A Preliminary Study about Star Image Processing Method in Harsh Environment.- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection.- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network.- Evaluation of training effect of new-type professional Farmer based on cloud model.- A study on the characteristics of college students' consumption behavior based on clustering and association rules.- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5.- Exploiting API description information to improve code comment generation.- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process.- Data Processing and Development of Big Data System: A Survey.- Current PHM Surveys for Mechanical Engineering.- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.- Research on Crop Growth Period Estimation Based on Fusion Features.- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data.- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students.- Anomaly detection based on isolated forests.- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery.- Design of Abnormal Behavior Detection System in the State Grid Business Office.- Research on the Application of Intelligent Detection Technology in Business Hall System.- Study on Freshness Indicator Agent of Natural Plant Pigment.- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak.- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning.- Cloud Computing and Security.- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency.- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing.- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing.- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges.- Research on Security Mechanism and Forensics of SQLite Database.- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes.- Boolean functions with a few Walsh transform values.- Research on Automation Strategy of Coq.- A Model Design of Cost-effificient Blockchain Framework for E-Government Application.- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing.- A Dynamic Decision-making Method for Endorser Node Selection.- A Proxy Node Resource Load Balancing Strategy Based on the Swift System.- Research on the Picture Database of Minority Emotion.- Instant Messaging Application Traffic Recognition.