| TÃtulo : |
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II |
| Tipo de documento: |
documento electrónico |
| Autores: |
Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XVIII, 746 p. 111 ilustraciones |
| ISBN/ISSN/DL: |
978-3-030-78618-2 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Software de la aplicacion Red de computadoras Sistemas informáticos Computadoras Propósitos especiales Gestión de base de datos Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Implementación de sistema informático Sistemas de propósito especial y basados ​​en aplicaciones |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . |
| Nota de contenido: |
Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in faultdetection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XVIII, 746 p. 111 ilustraciones. ISBN : 978-3-030-78618-2 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Software de la aplicacion Red de computadoras Sistemas informáticos Computadoras Propósitos especiales Gestión de base de datos Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Implementación de sistema informático Sistemas de propósito especial y basados ​​en aplicaciones |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . |
| Nota de contenido: |
Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in faultdetection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |