|
" Frontier computing : "
editors, Jason C. Hung, Neil Y. Yen, Kuan-Ching Li.
Document Type
|
:
|
BL
|
Record Number
|
:
|
891289
|
Main Entry
|
:
|
International Conference on Frontier Computing(7th :2018 :, Kuala Lumpur, Malaysia)
|
Title & Author
|
:
|
Frontier computing : : theory, technologies and applications (FC 2018) /\ editors, Jason C. Hung, Neil Y. Yen, Kuan-Ching Li.
|
Publication Statement
|
:
|
Singapore :: Springer,, 2018.
|
Series Statement
|
:
|
Lecture notes in electrical engineering ;; volume 542
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
9789811336485
|
|
:
|
: 9811336482
|
|
:
|
9789811336478
|
Contents
|
:
|
Intro; Contents; Research on Application's Credibility Test Method and Calculation Method Based on Application Behavior Declaration; Abstract; 1 Introduction; 2 Design of Credibility Verification Method; 2.1 Definition of ABD; 2.2 Application Implement Verification Module; 2.3 Tracking Module Records Actions of Application; 2.4 Verify Program Analysis Tracking Information; 3 Credibility Verification; 3.1 Standard of Credibility Verification; 3.2 Recessive Parameter Model and Calculation; 3.3 Credibility Judgment of Similar Behavior; 4 Conclusion; References
|
|
:
|
2 Physics structure3 Deep Reinforcement Learning Model; 4 Experiments and Results Analysis; 4.1 Experimental Environment; 4.2 Experimental Model Setup; 4.3 Results Analysis; 5 Conclusion; References; Predicting Students' Academic Performance Using Utility Based Educational Data Mining; Abstract; 1 Introduction; 2 Literature Review; 3 Materials and Methods; 4 Results and Discussion; 5 Conclusion; 6 Future Work; Acknowledgements; References; Theme Evolution Analysis of Public Security Events Based on Hierarchical Dirichlet Process; Abstract; 1 Introduction; 2 Research Background; 2.1 HDP
|
|
:
|
2.2 The Stick-Breaking Construction3 MD-HDP Theme Generation Model; 3.1 Model Frame; 3.2 Model of Stick-Breaking Construction; 3.3 Thematic Content Evolutionary Analyze Method; 4 Experiments; 4.1 Data Set; 4.2 Experimental Setting; 4.3 Thematic Evolution Analysis of Data Setting; 4.4 Model Effect Evaluation; 5 Conclusion and Future Works; Acknowledgements; References; Recurrent Neural Networks for Analysis and Automated Air Pollution Forecasting; 1 Introduction; 2 Background Review and Related Work; 2.1 Rhadoop; 2.2 Visualizations R Using the Shiny Server; 2.3 Recurrent Neural Networks
|
|
:
|
2.4 Realted Work3 System Design and Implementation; 3.1 System Architecture; 3.2 Lag-Time in RNN for Prediction; 3.3 RNN Model Optimization; 4 Experimental Environment and Results; 4.1 Experimental Environment; 4.2 RNN Parameters Optimization; 4.3 RNN Model Visualization; 5 Conclusion; References; A Social Influence Account of Problematic Smartphone Use; Abstract; 1 Introduction; 2 Literature Review; 3 Method; 4 Analysis and Conclusion; References; Simulation Analysis of Information-Based Animal Observation System; Abstract; 1 Introduction; 2 Related Work; 3 Model Development; 4 Analysis
|
|
:
|
The Selection of DNA Aptamers Against the Fc Region of Human IgGAbstract; 1 Introduction; 2 Materials and Methods; 2.1 Materials and Reagents; 2.2 Parent Sequence and Mutation Rules for Child Sequences; 2.3 Computational Assay; 2.4 ELISA Test; 3 Results and Discussions; 3.1 Molecular Simulation Results for Apt 8 and Apt 8_DNA; 3.2 The Candidate Sequences Predicted by Molecular Simulations; 3.3 Results of ELISA Assay; 4 Conclusions; Acknowledgements; References; Application of Deep Reinforcement Learning in Beam Offset Calibration of MEBT at C-ADS Injector-II; 1 Introduction
|
Abstract
|
:
|
This book presents the proceedings of the 6th International Conference on Frontier Computing, held in Kuala Lumpur, Malaysia on July 3-6, 2018, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The contributions cover a wide range of topics: database and data mining, networking and communications, web and internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions. The book is a valuable resource for students, researchers and professionals, and also offers a useful reference guide for newcomers to the field.
|
Subject
|
:
|
Computer science, Congresses.
|
Subject
|
:
|
Databases, Congresses.
|
Subject
|
:
|
Information technology, Congresses.
|
Subject
|
:
|
Computer science.
|
Subject
|
:
|
COMPUTERS-- Computer Literacy.
|
Subject
|
:
|
COMPUTERS-- Computer Science.
|
Subject
|
:
|
COMPUTERS-- Data Processing.
|
Subject
|
:
|
COMPUTERS-- Hardware-- General.
|
Subject
|
:
|
COMPUTERS-- Information Technology.
|
Subject
|
:
|
COMPUTERS-- Machine Theory.
|
Subject
|
:
|
COMPUTERS-- Reference.
|
Subject
|
:
|
Databases.
|
Subject
|
:
|
Information technology.
|
Dewey Classification
|
:
|
004.6
|
LC Classification
|
:
|
QA75.5
|
Added Entry
|
:
|
Hung, Jason C.,1973-
|
|
:
|
Kuai, Lin
|
|
:
|
Yen, Neil Y.
|
Parallel Title
|
:
|
FC 2018
|
| |