語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advances in Artificial Intelligence ...
~
Bertino, Elisa.
Advances in Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advances in Artificial Intelligence and Security/ edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino.
其他題名:
7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /
其他作者:
Bertino, Elisa.
面頁冊數:
XVIII, 746 p. 111 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Database Management. -
電子資源:
https://doi.org/10.1007/978-3-030-78618-2
ISBN:
9783030786182
Advances in Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /
Advances in Artificial Intelligence and Security
7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /[electronic resource] :edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino. - 1st ed. 2021. - XVIII, 746 p. 111 illus.online resource. - Communications in Computer and Information Science,14231865-0937 ;. - Communications in Computer and Information Science,498.
Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in fault detection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter -- Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. .
ISBN: 9783030786182
Standard No.: 10.1007/978-3-030-78618-2doiSubjects--Topical Terms:
669820
Database Management.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advances in Artificial Intelligence and Security = 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /
LDR
:07114nam a22004095i 4500
001
1056361
003
DE-He213
005
20210915141902.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030786182
$9
978-3-030-78618-2
024
7
$a
10.1007/978-3-030-78618-2
$2
doi
035
$a
978-3-030-78618-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Advances in Artificial Intelligence and Security
$h
[electronic resource] :
$b
7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II /
$c
edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XVIII, 746 p. 111 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0937 ;
$v
1423
505
0
$a
Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in fault detection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter -- Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition.
520
$a
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. .
650
2 4
$a
Database Management.
$3
669820
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
669833
650
2 4
$a
Computer System Implementation.
$3
669803
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Database management.
$3
557799
650
0
$a
Special purpose computers.
$3
1204562
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
700
1
$a
Bertino, Elisa.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
675398
700
1
$a
Xia, Zhihua.
$e
editor.
$1
https://orcid.org/0000-0001-6860-647X
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1351792
700
1
$a
Zhang, Xiaorui.
$e
editor.
$1
https://orcid.org/0000-0002-7571-2593
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1351791
700
1
$a
Sun, Xingming.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1171801
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030786175
776
0 8
$i
Printed edition:
$z
9783030786199
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-3-030-78618-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入