رکورد قبلیرکورد بعدی

" Frontier computing : "


Document Type : BL
Record Number : 891289
Main Entry : International Conference on Frontier Computing(7th :2018 :, Kuala Lumpur, Malaysia)
Title & Author : Frontier computing : : theory, technologies and applications (FC 2018) /\ editors, Jason C. Hung, Neil Y. Yen, Kuan-Ching Li.
Publication Statement : Singapore :: Springer,, 2018.
Series Statement : Lecture notes in electrical engineering ;; volume 542
Page. NO : 1 online resource
ISBN : 9789811336485
: : 9811336482
: 9789811336478
Contents : Intro; Contents; Research on Application's Credibility Test Method and Calculation Method Based on Application Behavior Declaration; Abstract; 1 Introduction; 2 Design of Credibility Verification Method; 2.1 Definition of ABD; 2.2 Application Implement Verification Module; 2.3 Tracking Module Records Actions of Application; 2.4 Verify Program Analysis Tracking Information; 3 Credibility Verification; 3.1 Standard of Credibility Verification; 3.2 Recessive Parameter Model and Calculation; 3.3 Credibility Judgment of Similar Behavior; 4 Conclusion; References
: 2 Physics structure3 Deep Reinforcement Learning Model; 4 Experiments and Results Analysis; 4.1 Experimental Environment; 4.2 Experimental Model Setup; 4.3 Results Analysis; 5 Conclusion; References; Predicting Students' Academic Performance Using Utility Based Educational Data Mining; Abstract; 1 Introduction; 2 Literature Review; 3 Materials and Methods; 4 Results and Discussion; 5 Conclusion; 6 Future Work; Acknowledgements; References; Theme Evolution Analysis of Public Security Events Based on Hierarchical Dirichlet Process; Abstract; 1 Introduction; 2 Research Background; 2.1 HDP
: 2.2 The Stick-Breaking Construction3 MD-HDP Theme Generation Model; 3.1 Model Frame; 3.2 Model of Stick-Breaking Construction; 3.3 Thematic Content Evolutionary Analyze Method; 4 Experiments; 4.1 Data Set; 4.2 Experimental Setting; 4.3 Thematic Evolution Analysis of Data Setting; 4.4 Model Effect Evaluation; 5 Conclusion and Future Works; Acknowledgements; References; Recurrent Neural Networks for Analysis and Automated Air Pollution Forecasting; 1 Introduction; 2 Background Review and Related Work; 2.1 Rhadoop; 2.2 Visualizations R Using the Shiny Server; 2.3 Recurrent Neural Networks
: 2.4 Realted Work3 System Design and Implementation; 3.1 System Architecture; 3.2 Lag-Time in RNN for Prediction; 3.3 RNN Model Optimization; 4 Experimental Environment and Results; 4.1 Experimental Environment; 4.2 RNN Parameters Optimization; 4.3 RNN Model Visualization; 5 Conclusion; References; A Social Influence Account of Problematic Smartphone Use; Abstract; 1 Introduction; 2 Literature Review; 3 Method; 4 Analysis and Conclusion; References; Simulation Analysis of Information-Based Animal Observation System; Abstract; 1 Introduction; 2 Related Work; 3 Model Development; 4 Analysis
: The Selection of DNA Aptamers Against the Fc Region of Human IgGAbstract; 1 Introduction; 2 Materials and Methods; 2.1 Materials and Reagents; 2.2 Parent Sequence and Mutation Rules for Child Sequences; 2.3 Computational Assay; 2.4 ELISA Test; 3 Results and Discussions; 3.1 Molecular Simulation Results for Apt 8 and Apt 8_DNA; 3.2 The Candidate Sequences Predicted by Molecular Simulations; 3.3 Results of ELISA Assay; 4 Conclusions; Acknowledgements; References; Application of Deep Reinforcement Learning in Beam Offset Calibration of MEBT at C-ADS Injector-II; 1 Introduction
Abstract : This book presents the proceedings of the 6th International Conference on Frontier Computing, held in Kuala Lumpur, Malaysia on July 3-6, 2018, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The contributions cover a wide range of topics: database and data mining, networking and communications, web and internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions. The book is a valuable resource for students, researchers and professionals, and also offers a useful reference guide for newcomers to the field.
Subject : Computer science, Congresses.
Subject : Databases, Congresses.
Subject : Information technology, Congresses.
Subject : Computer science.
Subject : COMPUTERS-- Computer Literacy.
Subject : COMPUTERS-- Computer Science.
Subject : COMPUTERS-- Data Processing.
Subject : COMPUTERS-- Hardware-- General.
Subject : COMPUTERS-- Information Technology.
Subject : COMPUTERS-- Machine Theory.
Subject : COMPUTERS-- Reference.
Subject : Databases.
Subject : Information technology.
Dewey Classification : ‭004.6‬
LC Classification : ‭QA75.5‬
Added Entry : Hung, Jason C.,1973-
: Kuai, Lin
: Yen, Neil Y.
Parallel Title : FC 2018
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟