Computer Applications
Springer Verlag, Singapore
978-981-95-5293-1 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
The 43 full papers and presented in this book were carefully selected and reviewed from 269 submissions. These papers have been organized in the following topical sections:
Artificial Intelligence and Applications
Cyberspace Security Technology
Data Science and Big Data Technology
Frontier Technology Applications
Artificial Intelligence and Applications.- A Fractional-Order Automatic Feature Matching Algorithm for Image Rotation and Scaling.- Multistrategy Improved Dung Beetle Optimization Algorithm and its Application in ALBP-1.- Aggregation of Dialogue History Information and Utterance-Slot Attention for Dialogue State Tracking.- Research on Children's ADHD Detection Algorithm Based on BASA-FMGNet.- NAD-KRQG: Neural Association-Based Cognitive Diagnosis with Knowledge Recommendation and Question Generation.- NOTEARS-cMLP: Learning Nonparametric DAGs with Domain Knowledge.- Humanoid Robots Gate-Passing Method Based on SAC Algorithm with Generative Adversarial Networks.- Link Prediction Method Based on Structural Hole Characterization under Multi-Order Paths.- Research on an Elevator Group Control Method Based on Interactive Artificial Bee Colonies.- STUAformer: Spatio-Temporal Unified Aggregate Transformer Model for Traffic Speed Prediction.- STAGAT: Spatio-Temporal Aggregation Graph Attention Network for Traffic Prediction.- Intelligent Software Testing Platform Selection and Knowledge Graph-Driven Test Case Generation.- A Method for Generating Class Integration Test Sequences Based on Simulated Annealing Particle Swarm Optimization.- Research on Multi-Scale Lesion Detection in Human Lung CT Images Based on Deep Learning.- Riding the Wave of LLMs: Navigating Opportunities and Challenges in Chinese Information Technology Application Innovation.- Air Quality Inference with Multi-Source Heterogeneous Data and FSMoE-LSC Model.- CHOLD: Offensive Language Detection Method for Chinese Texts.- STMFNet: A Spatial-Temporal Masking and Feature Fusion Model for Traffic Flow Prediction.- Dual-Grained Alignment with Dynamic Clip Modeling for Partially Relevant Video Retrieval.- Content-Function Coupling Based Recommendation Mechanism for Holographic Communication.- Intelligent Question and Answer System for Policies Based on Graph Database.- Research Progress and Frontier Applications of Graph Neural Networks.- Cross-Consistent Dual-ConvMixer Network with Feature Alignment for Salivary Gland Tumor Ultrasound Image Segmentation.- Domain-Constrained BVAE-Based Method for Intelligent Plastic Formulation Design.- HDRS: Transmission, Computing and Caching Resource Scheduling for Holographic-Type Communication Based on In-Network Computing.- Interleaved Spatial-Temporal Attention Aggregation Gated Transformer for Traffic Flow Prediction.- Color Image Steganography Based on a GAM-CBAM Dual Attention Mechanism.- TIP: A multidimensional Feature Extraction Method for Extreme Financial Risk by Fusing Information Value Evaluation.- MLAF-G: A Lightweight Multilevel Feature Fusion Classification Network for Plant Diseases Based on Ghostnet.- Unsupervised Cluster-Generation Graph Learning for Industrial Equipment Anomaly Detection.- Research on Precision Prediction of Geospatial Choices for Postgraduate Graduation Destinations Based on Machine Learning Algorithms.- A Deep Forgery Detection Method Based on Adaptive Features in Both Spatial Domain and Frequency Domain.- Dual-PhysNet: A Physics-Guided Dual-Path Lightweight Network for Underwater Image Superresolution Reconstruction.- Cyberspace Security Technology.- Load-Balancing Routing Optimization in SDN: A QoS-Aware Approach with Improved Shortest Path and Adaptive Resource Allocation.- Source Code Vulnerability Detection Method Based on Hybrid Retrieval-Augmented Generation Technology.- Intrinsic Security of Artificial Intelligence: System Vulnerabilities, Defense Mechanisms, and Theoretical Deepening.- Research on Efficient Cross-Domain Authentication Scheme Based on Blockchain and Edge Computing.- Data Science and Big Data Technology.- CHAKE: A Lightweight Chameleon Hash Based Authenticated Key Exchange for IoT.- An Online Time Series Decomposition Algorithm with a Multiplicative Trend-Seasonality Relationship in an Additive Model.- Frontier Technology Applications.- Research on Convolutional Neural Network Implementation Methods for Embedded Systems.- Research on the Social Attributes of Power Grid Residents with the 3 M-CNN-SC-SRU Customer Profiling the 3 M-CNN-SC-SRU Model for Customer Profiling from Electricity Consumption Data.- Identification of Parkinson’s Disease Subtypes via a Multimodal Data Fusion Method.- Anomaly Prediction in Power Data Platforms Using a Transformer-BiLSTM Model.
| Erscheint lt. Verlag | 6.3.2026 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XII, 648 p. |
| Verlagsort | Singapore |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
| Technik | |
| Schlagworte | Artificial Intelligence and Applications • Data Science and Technology • Frontier and Comprehensive Applications • Network Communication and Security • Pattern Recognition & Machine Learning |
| ISBN-10 | 981-95-5293-1 / 9819552931 |
| ISBN-13 | 978-981-95-5293-1 / 9789819552931 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich