Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9783031318603
    Language: English
    Pages: 1 Online-Ressource(XIV, 578 p. 201 illus., 161 illus. in color.)
    Edition: 1st ed. 2023.
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies 172
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Computational intelligence. ; Cooperating objects (Computer systems). ; Data protection. ; Engineering
    Abstract: Image Retrieval Algorithm of Intangible Cultural Heritage Based on Artificial Intelligence Technology -- Network Lossless Information Hiding Communication Method Based on Big Data -- Anomaly Recognition Method of Network Media Large Data Stream Based on Feature Learning -- Design and Implementation of Automatic Quick Report Function for WeChat on Earthquake Information in Liaoning -- Application of BIM + GIS Technology in Smart city 3D Design System -- Myopic retailer’s Cooperative Advertising Strategies in Supply Chain Based on Differential Games -- Hardware System of Thermal Imaging Distribution Line Temperature Monitor based on Digital Technology -- Applications of Key Automation Technologies in Machine Manufacturing Industry -- The application of Vr technology in Han Embroidery Digital Museum -- Analysis of International Trade Relations Forecasting Model Based on Digital Trade -- Empirical Analysis of Online Broadcast Based on TAM Model -- A High Resolution Wavelet Chaos Algorithm for Optimization of Image Separation Processing in Graphic Design -- Design and Implementation of Smart Tourism Scenic Spot Monitoring System Based on STM32 -- Herd Effect Analysis of Stock Market Based on Big Data Intelligent Algorithm -- Intelligent Recommendation System for Early Childhood Learning Platform Based on Big Data and Machine Learning Algorithm -- Big Data Technology Driven 5G Network Optimization Analysis -- An Enterprise Financial Statement Identification Method based on Support Vector Machine -- An AIS Trusted Requirements Model for Cloud Accounting Based on Complex Network.
    Abstract: This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783031317750
    Language: English
    Pages: 1 Online-Ressource(XVI, 584 p. 245 illus., 181 illus. in color.)
    Edition: 1st ed. 2023.
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies 173
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Computational intelligence. ; Cooperating objects (Computer systems). ; Data protection. ; Engineering
    Abstract: Ecological Balance Construction and Optimization Strategy Based on Intelligent Optimization Algorithm -- The Design of Virtual Reality Systems for Metaverse Scenarios -- Design and Development of Health Data Platform for Home-Based Elderly Care Based on AAL -- Logistics Distribution Optimization System of Cross-border e-Commerce Platform based on Bayes-BP Algorithm -- Application of FCM Clustering Algorithm in Digital Library Management System -- Logistics Distribution Path Planning and Design based on Ant Colony Optimization Algorithm -- The Development of Power Grid Digital Infrastructure Based on Fuzzy Comprehensive Evaluation -- Virtual Reality Technology in Indoor Environment Art Design -- Application of Digital Virtual Art in 3D Film Animation Design Effect -- Digital Media Art and Visual Communication Design Method Under Computer Technology -- Instrumentation Automation Control System Based on HSV Space and Genetic Algorithm -- Biological Tissue Detection System Based on Improved Optimization Algorithm -- Application of Computer Network Security Technology in Software Development -- The Application of Financial Technology in the Intelligent Management of Credit Risk under the Background of Big Data -- Measurement and Prediction of Carbon Sequestration Capacity Based on Random Forest Algorithm.
    Abstract: This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783030978747
    Language: English
    Pages: 1 Online-Ressource(XXI, 1070 p. 332 illus., 159 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies 125
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Engineering—Data processing. ; Cooperating objects (Computer systems). ; Data protection.
    Abstract: An Empirical Study on the Evolutionary Mechanism of Tourism Enterprises in Computer System Data Analysis -- A Preliminary Study of the Modeling and Simulation Technology of New Artificial Intelligence System in the Era of Big Data -- Computer Distributed Mirror Storage Algorithm for Desktop Virtualization -- Construction of Financial Investment Risk Measurement Model Based on Big Data -- Research on Straw Weaving Modeling System Based on Machine Learning Algorithm -- 5G New Radio Waveform with Time-Frequency Optimized Multiwavelet Packet -- Application of AR Technology in the Design of Cultural Communication Platform System -- Application Research on Facial Makeup Modeling Activation of Classical Opera Based on AR Virtual Information Technology -- An Evaluation Method of Light Strip Center Detection Algorithm Based on Line Structured Light Vision -- Design and Application Analysis of Network Command System for Power Grid Dispatching Operation -- Research and Implementation of Application Scenarios for Dispatching Voice Interaction Based on Artificial Intelligence -- Intelligent Accounting System Structure and Intelligent Accounting Algorithm Based on Computer Vision -- A Research on the Intelligent Recognition of Athletes’ Wrong Actions Based on Visual Data Technology -- Virtual Reality Video CU Partition Fast System Based on Dynamic Selection Algorithm -- Risk Analysis Model of Financial Management Products Based on Clustering Algorithm -- Weak and Small Face Target Recognition based on MTCNN Network in Dynamic Platform.
    Abstract: This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9783030969080
    Language: English
    Pages: 1 Online-Ressource(XXIV, 1061 p. 296 illus., 218 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies 123
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Engineering—Data processing. ; Cooperating objects (Computer systems). ; Data protection.
    Abstract: Intelligent Archives Warehouse Management Based on New Information Technology -- Design and Algorithm of File Management System Based on RFID -- Design of Information System for Accounting File Management Based on Computer Technology -- Substation Cable Laying Schedule Based on GIM 3D Model -- Social Service Management System Based on Logistic Regression Algorithm -- Timing System of Track and Field Competition Based on Data Analysis Algorithm -- Financial Software Perception Function Based on Big Data Intelligent Technology -- Effective Combination of Intelligent Information Technology and Labor Education Data Analysis Algorithms -- Chinese Language and Literature Relational Database Mining Based on Association Rules Algorithm -- Internet Financial News Text Classification Algorithm Based on Blockchain Technology -- Measurement and Change Analysis of Trade Implied Carbon Based on Input-Output Method and SDA Method under Modern Information Technology -- The Application of Big Data in Network Security and Intelligence Analysis -- Macroeconomic Forecast Based on Neural Network Algorithm and Genetic Algorithm -- Intelligent Optical Distribution Technology in Power Communication Transmission -- Intelligent Puncture Equipment in Sampling of Gynecological Tumors -- Design of Environmental Art Optimization System Based on Improved Particle Swarm Optimization Algorithm -- Software-assisted Japanese Phonetic Teaching Based on Phonetic Visualization.
    Abstract: This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...