Computer Applications
39th CCF National Conference of Computer Applications, CCF NCCA 2024, Harbin, China, July 15-18, 2024, Proceedings, Part II
Herausgegeben:Yu, Haipeng; Cai, Chengtao; Huang, Lan; Jing, Weipeng; Chen, Xuebin; Song, Xianhua; Lu, Zeguang
Computer Applications
39th CCF National Conference of Computer Applications, CCF NCCA 2024, Harbin, China, July 15-18, 2024, Proceedings, Part II
Herausgegeben:Yu, Haipeng; Cai, Chengtao; Huang, Lan; Jing, Weipeng; Chen, Xuebin; Song, Xianhua; Lu, Zeguang
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This two-volume set, CCIS 2274 and CCIS 2275, constitutes the refereed proceedings of the 39th National Conference on China Computer Federation, CCF NCCA 2024, held in Harbin, China, during July 15-18, 2024.
The 48 full papers presented here were carefully reviewed and selected from 238 submissions. These papers are organized in the following topical sections:
Part I: Artificial Intelligence and Applications; Data Science and Technology.
Part II: Pattern Recognition & Machine Learning; Network Communication and Security; Frontier and Comprehensive Applications; Data Science and Technology. …mehr
Andere Kunden interessierten sich auch für
- Computer Applications55,99 €
- Computer Applications52,99 €
- Computer Applications52,99 €
- Pattern Recognition and Computer Vision55,99 €
- Pattern Recognition and Computer Vision55,99 €
- Pattern Recognition and Computer Vision60,99 €
- Computer Vision, Pattern Recognition, Image Processing, and Graphics74,99 €
-
-
-
This two-volume set, CCIS 2274 and CCIS 2275, constitutes the refereed proceedings of the 39th National Conference on China Computer Federation, CCF NCCA 2024, held in Harbin, China, during July 15-18, 2024.
The 48 full papers presented here were carefully reviewed and selected from 238 submissions. These papers are organized in the following topical sections:
Part I: Artificial Intelligence and Applications; Data Science and Technology.
Part II: Pattern Recognition & Machine Learning; Network Communication and Security; Frontier and Comprehensive Applications; Data Science and Technology.
The 48 full papers presented here were carefully reviewed and selected from 238 submissions. These papers are organized in the following topical sections:
Part I: Artificial Intelligence and Applications; Data Science and Technology.
Part II: Pattern Recognition & Machine Learning; Network Communication and Security; Frontier and Comprehensive Applications; Data Science and Technology.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2275
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-9673-1
- Seitenzahl: 372
- Erscheinungstermin: 31. Dezember 2024
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 564g
- ISBN-13: 9789819796731
- ISBN-10: 9819796733
- Artikelnr.: 71773360
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 2275
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-9673-1
- Seitenzahl: 372
- Erscheinungstermin: 31. Dezember 2024
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 564g
- ISBN-13: 9789819796731
- ISBN-10: 9819796733
- Artikelnr.: 71773360
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Pattern Recognition & Machine Learning.- YOLOv5s Multimode Sensing Based Pipe Network Detection and Inspection Method.- Automatic Analysis Framework for Campus Wireless Network Performance Based on Web Services and Supervised Learning Methods.- Learning to Score Sign Language with Two Stage Method.- A Lightweight Dual Path Conformer Network for Speech Separation.- SLPNet Student Learning Performance Prediction During the COVID19 Pandemic Via a Deep Neural Network.- A Rapid Finger Vein Recognition Approach Based on UNet.- A Surface Defect Detection Method Based on Domain Correlation.- FDA UNet Frequency Domain Dual Attention Based on UNet for Stain Normalization.- A DQN Based Resource Adaptation Strategy for In Network Computing Based Holographic Type Communication.- Local Multiscale Aggregation with a Global Attention Super Resolution Network.- An Adaptive Capsule Network Based on 3D Convolution Based Attention.- A Comprehensive Attention Scoring Model for Collaborative Learning.- Network Communication and Security.- Analysis of the Influence of Multi Point Pumping on the Gain in an Optical Fiber Amplifier.- Exploring the Feasibility of Raspberry Pi 4 Model B Clusters as an Alternative to Advanced Process Chip Computers.- Internal Task Offloading Deployment Mechanism of In Network Computing Devices for Holographic Type Communication.- A Review of Research on Vehicle CAN Network Intrusion Detection via Artificial Intelligence.- IEN NFT A Naming Based Novel Semantic NFT Architeture with Intrinsic Binding and Flexible Interoperability.- Frontier and Comprehensive Applications.- From DPI Data to Warning Real Time Risk Assessment in the Fight Against Internet Fraud.- Information Propagation Model Based on 2 Dimensional Simplicial Complexes.- Quantitative Evaluation of the Whitening Effects of Facial Masks via EfficientNet and the Wavelet Transform.- Data Science and Technology.- FabricDG A Transaction Conflict Optimization Solution for the Consortium Blockchain.- Multivariate Time Series Forecasting of Integrated Energy Systems Based on Fast Fourier Transform Fully Connected Space Time Graph.- Automobile Parts Detection and Traceability Based on Blockchain and Federated Learning.- Research on Traceability Encryption of Auto Parts Based on Blockchain and IBE.- An Efficient Method for Encrypting and Protecting Electricity Usage Privacy Data.
Pattern Recognition & Machine Learning.- YOLOv5s Multimode Sensing Based Pipe Network Detection and Inspection Method.- Automatic Analysis Framework for Campus Wireless Network Performance Based on Web Services and Supervised Learning Methods.- Learning to Score Sign Language with Two Stage Method.- A Lightweight Dual Path Conformer Network for Speech Separation.- SLPNet Student Learning Performance Prediction During the COVID19 Pandemic Via a Deep Neural Network.- A Rapid Finger Vein Recognition Approach Based on UNet.- A Surface Defect Detection Method Based on Domain Correlation.- FDA UNet Frequency Domain Dual Attention Based on UNet for Stain Normalization.- A DQN Based Resource Adaptation Strategy for In Network Computing Based Holographic Type Communication.- Local Multiscale Aggregation with a Global Attention Super Resolution Network.- An Adaptive Capsule Network Based on 3D Convolution Based Attention.- A Comprehensive Attention Scoring Model for Collaborative Learning.- Network Communication and Security.- Analysis of the Influence of Multi Point Pumping on the Gain in an Optical Fiber Amplifier.- Exploring the Feasibility of Raspberry Pi 4 Model B Clusters as an Alternative to Advanced Process Chip Computers.- Internal Task Offloading Deployment Mechanism of In Network Computing Devices for Holographic Type Communication.- A Review of Research on Vehicle CAN Network Intrusion Detection via Artificial Intelligence.- IEN NFT A Naming Based Novel Semantic NFT Architeture with Intrinsic Binding and Flexible Interoperability.- Frontier and Comprehensive Applications.- From DPI Data to Warning Real Time Risk Assessment in the Fight Against Internet Fraud.- Information Propagation Model Based on 2 Dimensional Simplicial Complexes.- Quantitative Evaluation of the Whitening Effects of Facial Masks via EfficientNet and the Wavelet Transform.- Data Science and Technology.- FabricDG A Transaction Conflict Optimization Solution for the Consortium Blockchain.- Multivariate Time Series Forecasting of Integrated Energy Systems Based on Fast Fourier Transform Fully Connected Space Time Graph.- Automobile Parts Detection and Traceability Based on Blockchain and Federated Learning.- Research on Traceability Encryption of Auto Parts Based on Blockchain and IBE.- An Efficient Method for Encrypting and Protecting Electricity Usage Privacy Data.