Format:
1 Online-Ressource (XIV, 412 p. 203 illus., 133 illus. in color)
Edition:
1st ed. 2019
ISBN:
9783030341398
Series Statement:
Information Systems and Applications, incl. Internet/Web, and HCI 11910
Content:
A Survey of Deep Learning Applied to Story Generation. -- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates -- An Improved Prediction Model for the Network Security Situation -- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles -- An Improved Assessment Method for the Network Security Risk -- A High-Performance Storage System Based with Dual RAID Engine -- An Universal Perturbation Generator for Black-box Attacks against Object Detectors -- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle -- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification -- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs -- I2P Anonymous Communication Network Measurement and Analysis -- Plot Digitizing over Big Data Using Beam Search -- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud -- Do Top Socail APPS Effect Voice Call? Evidence from Propensity Score Matching Methods -- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB -- Smart Custom Package Decision for Mobile Internet Services -- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City -- Automated Classification of Attacker Privileges Based on Deep Neural Network -- nnD: Shallow Neural Network Based Collision Decoding in IoT communications -- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction -- An Elephant Ow Detection Method Based on Machine Learning -- AI Enhanced Automatic Response System for Resisting Network Threats -- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking -- EIGRP to OSPF Migration in Production Network -- A Hardware Trojan Detection Method Design Based on TensorFlow -- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation -- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery -- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network -- Analysis and Prediction of Commercial Big Data Based on WIFI Probe -- Design and Optimization of Camera HAL Layer Based on Android -- Music Rhythm Customized Mobile Application Based on Information Extraction -- Computational Challenges and Opportunities in Financial Services -- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme -- Applications of Machine Learning Tools in Genomics: A Review -- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context -- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts -- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi -- Research on Template-based Factual Automatic Question Answering Technology -- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm -- Machine Learning for Cancer Subtype Prediction with FSA Method -- Autonomous Vehicle Communication In V2X Network With LoRa Protocol
Content:
This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field
Additional Edition:
ISBN 9783030341381
Additional Edition:
Erscheint auch als Druck-Ausgabe International Conference on Smart Computing and Communication (4. : 2019 : Birmingham) Smart computing and communication Cham : Springer, 2019 ISBN 9783030341381
Additional Edition:
ISBN 3030341380
Language:
English
Subjects:
Computer Science
Keywords:
Deep learning
;
Computersicherheit
;
Konferenzschrift
DOI:
10.1007/978-3-030-34139-8