Atnaujinkite slapukų nuostatas

El. knyga: New Trends in Computer Technologies and Applications: 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022, which took place in Taoyuan, Taiwan, in December 2022. ICS is one of the largest joint international IT symposia held in Taiwan. Founded in 1973, it is intended to provide a forum for researchers, educators, and professionals to exchange their discoveries and practices, and to explore future trends and applications in computer technologies. The biannual symposium offers a great opportunity to share research experiences and to discuss potential new trends in the IT industry.

The 58 full papers and one invited paper presented in this volume were carefully reviewed and selected from 137 submissions. The papers have been organized in the following topical sections: Invited Paper; Algorithms, Bioinformatics, and Computation Theory; Cloud Computing and Big Data; Computer Vision and Image Processing; Cryptography and Information Security; Electronics and Information Technology; Mobile Computation and Wireless Communication; Ubiquitous Cybersecurity and Forensics.
Invited Paper.- High-Radix Interconnection Networks. -Algorithms,
Bioinformatics, and Computation Theory.- String editing under pattern
constraints.- Priority Algorithms with Advice for Disjoint Path Allocation
Problems (Extended Abstract).- On Two Variants of Induced Matchings.- A tree
structure for local diagnosis in multiprocessor systems under comparison
model.- Multiagent Learning for Competitive Opinion Optimization
(Extended Abstract).- The Maximum Zero-Sum Partition Problem.- Combined
Bayesian and RNN-based Hyperparameter Optimization for Efficient Model
Selection Applied for autoML.- Adiabatic Quantum Computation for Cyber Attack
and Defense Strategies.- Computation Offloading Algorithm Based on Deep
Reinforcement Learning and Multi-Task Dependency for Edge Computing.- A
Comparison Diagnosis Algorithm for Conditional Fault Local Diagnosis of
Multiprocessor Systems.- Novel ways of enumerating restrained dominating sets
of cycles.- Fault Diagnosability of Multigraph Matching Composition
Networks.- Generating Scale-Free Outerplanar Networks.- Hamiltonian
Properties of the Dragonfly Network.- Fine Grained Space Complexity and the
Linear Space Hypothesis (Preliminary Report).- Partition-Edge Fault-Tolerant
Hamiltonicity of Pancake Graphs.- Cloud Computing and Big Data.- Query
Regrouping Problem on Tree Structure for GPUs Accelerated Platform.- The
Enhancement of Classification of Imbalanced Dataset for
Edge Computing.- Development of Personnel Epidemic Prevention Monitoring
Access Control System.- The Use of Serverless Processing in Web Application
Development.- Scaling Model for vIMS on the Cloud.- Using classification
algorithms to predict Taiwan Stock Market - A Case study of Taiwan Index
Futures.- Semi-Automatic Chatbot Generation for Web APIs.- Prediction
ofMiddle-Aged Unhealthy Facial Skin using VGG19 and Support Vector Machine
Models.- Computer Vision and Image Processing.- Real-Time Intentional Eye
Blink Detection Using Rhombus Identification.- Difficulty-Aware Mixup for
Replay-based Continual Learning.- Vision-Based Lightweight Facial Respiration
and Heart Rate Measurement Technology.- GAN-based Criminal Suspect Face
Generator.- Cryptography and Information Security.- Automatic Summarization
of Critial Threat Intelligence Using Transfer Learning.- Anti-screenshot
Watermarking Algorithm about Archives Image Based on Deep Learning
Model.- Detecting Android malware by combining system call
sequencerelationships with local feature calculation.- A Detector Using
Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious
JavaScript with Obfuscations.- A Lightweight and Robust Authentication and
Key Agreements with PhysicallyUnclonable Function in Manufacturing
Environments.- Image compression and meaningful ciphertext encryption based
on improved infinite collapse 2D hyperchaos and histogram shift embedding.- A
Robust Two Factor Authentication Scheme with Fine Grained Biometrics
Verification.- Electronics and Information Technology.- Applying an IoT
Analytics Framework in East Asia Area.- Android Malware Classifier Combining
Permissions and API Features to face model drifting.- Design and
Implementation of the Optimized Computing Architecture for Matrix
Decomposition Algorithms.- Design and Implememtation of The CNN Accelator
Based on Multi-streaming SIMD Mechanisms.- Design and Implementation of The
Link-list DMA Controller for High Bandwidth Data Streaming.- STEM Education
Meets HPC.- Research on KNN-based GNSS Coordinate Classification for
Epidemic Management.- An Improved Light Weight Countermeasure Scheme to
Efficiently Mitigate TCP Attacks in SDN.- The Effectiveness of Block-based
Visualized Programming Learning on the problem-solving skills of the
Freshmen.- Behavior Profiling of Role-Playing Game Players Based on
Heuristic Event Log Mining.- The impact of live streaming on personal
purchase behavior.- Stochastic-Gradient-Descent-Based Max-Margin Early Event
Detector.- AHP-based Assessment of Developing Online Virtual Reality
Services with Progressive Web Apps.- From Data of Internet of Things to
Domain Knowledge: A Case Study of Exploration in Smart Agriculture.- Physical
Layer Coding and Cryptanalysis for The Security Communications.- Mobile
Computation and Wireless Communication.- 5G Network Slice Scalability based
on Management Data Analytics Function (MDAF).- Design and Analysis for
Wireless Tire Pressure Sensing System.- Ubiquitous Cybersecurity and
Forensics.- Preserving Collusion-free and Traceability in Car-sharing System
based on Blockchain.- Utilization of Theoretical Domains Framework (TDF) to
Validate the Digital Piracy Behaviour Constructs A systematic Literature
Review Study.- Domain-specific Anomaly Detection for In-vehicle
Networks.- LED: Learnable Encryption with Deniability.- Module Architecture
of Docker Image and Container Security.- High-Capacity Double-Layer Data
Hiding Technique Based on 3D Magic Cube.