Search Results - (( Defined ((contributors pensions) OR (contributors prisons)) plans ) OR ((((( Defined distributions applications plans ) OR ( Defined distribution properties bland ))) OR ( Defined distribution version pass ))))*

Refine Results
  1. 1

    Agents and multi-agent systems : technologies and applications 2021 : proceedings of 15th KES International Conference, KES-AMSTA 2021, June 2021 by KES-AMSTA (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xviii, 523 pages : illustrations (some color)).
    Contents: “…Learned Dynamics Models and Online Planning for Model-Based Animation Agents --…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  2. 2

    Hybrid Artificial Intelligent Systems : 8th International Conference, HAIS 2013, Salamanca, Spain, September 11-13, 2013 : proceedings by HAIS 2013 Salamanca, Spain, SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xx, 691 pages) : illustrations.
    Contents:
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 3
  4. 4

    Collaborative computing : networking, applications and worksharing : 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11-13, 2017, Proceedings by International Conference on Collaborative Computing: Networking, Applications, and Worksharing Edinburgh, Scotland, SpringerLink (Online service)

    Published: Springer, 2018
    Description: 1 online resource (xviii, 731 pages) : illustrations.
    Contents: “…Sentiment Analysis of Chinese Words Using Word Embedding and Sentiment Morpheme Matching -- Collaborative and Green Resource Allocation in 5G HetNet With Renewable Energy -- On Cost Efficient Dataflow Computing Program Deployment in SDN Managed Distributed Computing Environment -- A Short Review of Constructing Noise Map using Crowdsensing Technology -- Research of Positioning Tracking on Dynamic Target Based on the integral complementing algorithm -- LWTP: An Improved Automatic Image Annotation Method Based on Image Segmentation -- A Comparative Analysis of Content Delivery Capability for Collaborative Dual-Architecture Network -- AXE: Objects Search in Mobile Volunteered Service 9 Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones -- Constrained Route Planning Based on the Regular Expression -- A Human-Machine Collaborative Detection Model for Identifying Web Attacks -- A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment -- p-Faster R-CNN algorithm for food detection PUED: A Social Spammer Detection Method Based on PU Learning and Ensemble Learning -- Position vs. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  5. 5
  6. 6
  7. 7

    Wireless algorithms, systems, and applications : 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings. Part III by WASA (Conference) Nanjing Shi, China), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xvi, 601 pages) : illustrations (some color).
    Contents: “…-Automated Honey Document Generation Using Genetic Algorithm -- Image encryption for Wireless Sensor Networks with modified Logistic Map and new Hash algorithm -- Design and implementation of a real-time distributed precise point positioning platform -- Deployment of UAV-BS for Congestion Alleviation in Cellular Networks -- Robust Estimator for NLOS Error Mitigation in TOA-based Localization -- Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory -- Delivery Optimization for Unmanned Aerial Vehicles Based on Minimum Cost Maximum Flow With Limited Battery Capacity -- Optimized Segment Routing Traffic Engineeringwith Multiple Segments -- Robust and Efficient Mechanism Design for Heterogeneous Task Crowdsensing -- Lightweight Threshold Private Set Intersection via Oblivious Transfer -- Person Re-identification Algorithm Based on Spatial Attention Network -- OFDMA-based Asymmetric Full-duplex Media Access Control for the Next Generation WLANs -- Equitable Valuation of Crowdsensing for Machine Learning via Game Theory -- AERM: An Attribute-aware Economic Robust Spectrum Auction Mechanism -- Application of Matrix-NMS in face detection and autonomous driving -- Blockchain-based verifiable DSSE with forward security in multi-server environments -- GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM -- Online Task Scheduling for DNN-based Applications over Cloud, Edge and End Devices -- An SDN-based Self-adaptive Resource Allocation Mechanism for Service Customization -- Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning -- Multi-dimensional LSTM:A Model of NetworkText Classification -- Incentive Cooperation with Computation Delay Concerns for Socially-aware Parked Vehicle Edge Computing -- Complex Task Allocation in Spatial Crowdsourcing: A Task Graph Perspective -- Jointly Optimizing Throughput and Cost of IoV based on Coherent Beamforming and Successive Interference Cancellation Technology -- Deep Reinforcement Learning based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles -- A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations -- An Efficient Multi-Link Concurrent Transmission MAC Protocol for Long-delay Underwater Acoustic Sensor Networks -- An Advanced Cache Retransmission Mechanism for Wireless Mesh Network -- Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network -- Deep Learning-Based Task Offloading for Vehicular Edge Computing -- Hacks Hit the Phish: Phishing Attack Detection based on Hacks Search -- The sensor-cloud system and node reliability analysis -- Reinforcement Learning Based Seamless Handover Algorithm in SDN-enabled WLAN -- Attack traffic detection based on LetNet-5 and GRU hierarchical deep neural network -- Real-time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks -- Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds -- Deep Reinforcement Learning for DAG-based Concurrent Requests Scheduling in Edge Networks -- Generative Adversarial Scheme Based GNSS Spoofing Detection for Digital Twin Vehicular Networks -- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks -- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy -- New Rectangle Attack Against SKINNY Block Cipher -- Optimal convergence nodes deployment in hierarchical wireless sensor networks: an SMA-based approach -- A Virtual-Potential-Field-based Cooperative Opportunistic Routing Protocol for UAV Swarms -- Social-Interaction GAN: Pedestrian Trajectory Prediction -- An Intelligent Wallpaper Based on Ambient Light for Human Activity Sensing -- Adaptive Data Transmission and Task Scheduling for High-Definition Map Update -- Research on Path Planning for Relay Drones with Multiple Constraints -- A Reinforcement Model based Prioritized Replay to Solve the Offloading Problem in Edge Computing -- Authentication System Based on Fuzzy Extractors -- Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme -- Leveraging Fine-grained Self-Correlation in Detecting Collided LoRa Transmissions -- Blockchain Oracle-Based Privacy Preservation and Reliable Identification for Vehicles -- Objects Perceptibility Prediction Model Based on Machine Learning for V2I Communication Load Reduction -- KESAR: A High-Accuracy Prediction Algorithm and Solar-Aware Routing Strategy for Outdoor WSN -- Blockchain Empowered Federated Learning for Medical Data Sharing Model -- A Deep Learning Based Intelligent Transceiver Structure for Multiuser MIMO -- GreenAP: An Energy-saving Protocol for Mobile Access Points -- A Robust Multi-Tenant Server Consolidation Algorithm -- PM2.5 and PM10 Concentration Estimation based on the Top-of-Atmosphere Reflectance -- A Secure Sensing Data Collection Mechanism based on Perturbed Compressed Sensing -- An Edge-Cloud Collaborative Object Detection System -- Underwater Acoustic signal Modulation recognition Technology based on Deep Learning.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  8. 8

    Wireless algorithms, systems, and applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015 : proceedings by WASA (Conference) Qufu Shi, China), SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource (xvii, 858 pages) : illustrations.
    Contents: “…Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based "Handprint" Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 9
  10. 10

    Innovative data communication technologies and application : proceedings of ICIDCA 2021 by ICIDCA (Conference) Coimbatore, India), SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource (1 volume) : illustrations (black and white, and color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 11

    Ubiquitous computing application and wireless sensor : UCAWSN-14 by FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network Cheju-do, Korea, SpringerLink (Online service)

    Published: Springer, 2015
    Description: 1 online resource.
    Contents: “…Sharron -- A Model of Business Intelligence Systems for School: A Case Study (Perception Applications and Benefits); Y. Kurniawan -- A Surveillance Platform of Antimicrobial Use in Hospital Based on DDD(Defined Daily Dose); G. …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  12. 12

    Mobile wireless middleware, operating systems and applications : 11th EAI International Conference, MOBILWARE 2022, virtual event, December 28-29, 2022, Proceedings by International Conference on Mobile Wireless Middleware, Operating Systems and Applications Online, SpringerLink (Online service)

    Published: Springer, 2023
    Description: 1 online resource (xiii, 286 pages) : illustrations (some color).
    Contents: “…Middleware, Wireless, and Future Networks -- A Middleware-Based Approach for Latency-Sensitive Service Provisioning in IoT with End-Edge Cooperation -- Deep Reinforcement Learning based Congestion Control Mechanism for SDN and NDN in Satellite Networks -- intelligent automated penetration testing using reinforcement learning to improve the efficiency and effecctiveness of penetration testing -- Time Slot Correlation-Based Caching Strategy for Information-Centric Satellite Networks -- Design and implementation of a pipeline-based data scheduling method for spacecraft with multiple data buses -- Research on the Development of Intelligent Space System (ISS) -- Integrated Satellite-Terrestrial Information Network -- Features extraction of Reconstruction Model using in Augmented Reality System of Teleoperation Mobile Robots -- Research on Rapid 3D Reconstruction for Teleoperation in Manned Lunar Exploration Mission -- Onboard Software Maintenance Design and Implementation for networking satellites -- Model Based Development of Spacecraft OBDH Software -- Design of Aerospace Cloud Computing Server Based on Docker Cluster -- Integrated Satellite-Terrestrial Intelligent Information Processing, Decision and Planning (1) -- Analysis and Simulation of High Orbit Weak Signal Tracking Algorithm -- Avionics System Architectures for Software-Defined Spacecraft -- Research and application of energy efficiency optimization algorithm for spacecraft simulation platform -- SADA: SDN Architecture Based Secure Dynamic Access Scheme for Satellite Network -- Research on the Concept and Connotation of Space Proving Grounds (SPG) -- A Multi-Agent based Satellite Health Management System Architecture and Implementation Scheme -- Integrated Satellite-Terrestrial Intelligent Information Processing, Decision and Planning (2) -- Avionic system Architecture Design of the Manned Deep Space Exploration Spacecraft -- Research on Tianwen-1 Mars Probe Relay Communication Technology -- Design and practice of Communication System During EDL for Mars Probe -- Study on EMC Influence of Zhu Rong Rover UHF band communication system -- Design and implementation of power supply and distribution system for Mars landing mission -- Research on Integrated operation design of low orbit remote sensing satellite for intelligent application.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 13

    Monitoring, security, and rescue techniques in multiagent systems 1st ed. by MSRAS 2004 Płock, Poland, SpringerLink (Online service)

    Published: Springer, 2005
    Description: 1 online resource (xii, 596 pages) : illustrations.
    Contents: “…Foundations and Methods -- Flow Graphs, their Fusion and Data Analysis -- Approximation Spaces for Hierarchical Intelligent Behavioral System Models -- Distributed Adaptive Control: Beyond Single-Instant, Discrete Control Variables -- Multi-agent Planning for Autonomous Agents' Coordination -- Creating Common Beliefs in Rescue Situations -- Coevolutionary Processes for Strategic Decisions -- Automatic Proofs of Protocols via Program Transformation -- Mereological Foundations to Approximate Reasoning -- Data Security and Null Value Imputation in Distributed Information Systems -- Basic Principles and Foundations of Information Monitoring Systems -- Modelling Unreliable and Untrustworthy Agent Behaviour -- Nearest Neighbours without k -- Classifiers Based on Approximate Reasoning Schemes -- Towards Rough Applicability of Rules -- On the Computer-Assisted Reasoning about Rough Sets -- Similarity-Based Data Reduction and Classification -- Decision Trees and Reducts for Distributed Decision Tables -- Learning Concept Approximation from Uncertain Decision Tables -- In Search for Action Rules of the Lowest Cost -- Circularity in Rule Knowledge Bases Detection using Decision Unit Approach -- Feedforward Concept Networks -- Extensions of Partial Structures and Their Application to Modelling of Multiagent Systems -- Tolerance Information Granules -- Attribute Reduction Based on Equivalence Relation Defined on Attribute Set and Its Power Set -- Query Cost Model Constructed and Analyzed in a Dynamic Environment -- The Efficiency of the Rules' Classification Based on the Cluster Analysis Method and Salton's Method -- Extracting Minimal Templates in a Decision Table -- Application Domains and Case Studies -- Programming Bounded Rationality -- Generalized Game Theory's Contribution to Multi-agent Modelling -- Multi-Agent Decision Support System for Disaster Response and Evacuation -- Intelligent System for Environmental Noise Monitoring -- Multi-agent and Data Mining Technologies for Situation Assessment in Security-related Applications -- Virtual City Simulator for Education, Training, and Guidance -- Neurocomputing for Certain Bioinformatics Tasks -- Rough Set Based Solutions for Network Security -- Task Assignment with Dynamic Token Generation -- DyKnow: A Framework for Processing Dynamic Knowledge and Object Structures in Autonomous Systems -- Classifier Monitoring using Statistical Tests -- What Do We Learn When We Learn by Doing? …”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  14. 14

    Artificial intelligence in education : 15th international conference, AIED 2011, Auckland, New Zealand, June 28-July 1, 2011 by International Conference on Artificial Intelligence in Education Auckland, N.Z., SpringerLink (Online service)

    Published: Springer, 2011
    Description: 1 online resource (xxvi, 638 pages) : illustrations.
    Contents: “…Faster Teaching by POMDP Planning /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  15. 15
  16. 16

    Future data and security engineering : big data, security and privacy, smart city and Industry 4.0 applications : 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam... by FDSE (Conference) Ho Chi Minh City, Vietnam), SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource.
    Contents: “…Invited Keynotes -- Towards a Foundation of Web3 -- In-Memory Computing Architectures for Big data and Machine Learning Applications -- Secure and Efficient Implementation of Electronic Money -- Managing the Quality of Data and Metadata for Biobanks -- Big Data Analytics and Distributed Systems -- Towards A Privacy, Secured and Distributed Clinical Data Warehouse Architecture -- Improving the Storage Utilization of 0-Complete Trees as Index Structures -- Implement the Data Conversion System by using Lightweight Coreset for Validation Process -- Content Selection Methods Using User Interest Prediction Based on Similarities of Web Activities -- ImageNet Challenging Classification with the Raspberry Pis: A Federated Learning Algorithm of Local Stochastic Gradient Descent Models -- Covid-19 Detection Based on Lung Lesion Signs in Big Data Processing Environment -- Predicting Loan Repayment Using A Hybrid of Genetic Algorithms, Logistic Regression, and Artificial Neural Networks -- Performance Evaluation of Regular Decomposition and Benchmark Clustering Methods -- Security and Privacy Engineering -- Authentication of Luxury Products Identifying Key Requirements from a Seller and Consumer Perspective -- Analysis of A New Practical SPN-based Scheme in the Luby-Rackoff Model -- Authorization and Access Control for Different Database Models: Requirements and Current State of the Art -- A Hierarchical Deterministic Wallet using Ed25519 Digital Signature Scheme -- A Secure Framework for Internet of Medical Things Security Based System using Lightweight Cryptography enabled Blockchain -- Signature Algorithms on Non-commutative Algebras over Finite Fields of Characteristic Two -- Design a Smart Lock System Using Fingerprint and Password for Enhancing Security -- Machine Learning and Artificial Intelligence for Security and Privacy -- Towards an Attention-based Threat Detection System for IoT Networks -- Security and Privacy Issues and Solutions in Federated Learning for Digital Healthcare -- pPATE: A Pragmatic Private Aggregation of Teacher Ensembles Framework by Sparse Vector Technique based Differential Privacy, Paillier Cryptosystem and Human-in-the-loop -- Vietnamese Texts Writing Styles Based Authorship Identification Model -- Application of Machine Learning in Malware Detection -- Smart City and Industry 4.0 Applications -- Text Classification Models and Topic Models: An Overall Picture and A Case Study in Vietnamese -- Deep Hybrid Models for Forecasting Stock Midprices from the High-Frequency Limit Order Book -- An Image Denoising Model based on Nonlinear Partial Diferential Equation Using Deep Learning -- Recommendations in E-Commerce Systems based on Deep Matrix Factorization -- AttendanceKit: A set of Role-based Mobile Applications for Automatic Attendance Checking with UHF RFID using Realtime Firebase and Face Recognition -- Poses Classification in a Taekwondo Lesson using Skeleton Data extracted from Videos with Shallow and Deep Learning Architectures -- Social Distancing Violation Detection in Video using ChessBoard and Bird's-eye Perspective -- 3D-FaultSeg-UNet: 3D Fault Segmentation in Seismic Data Using Bi-stream U-Net -- Applying Artificial Intelligence to Plan Flight Paths for Aircraft at Subsonic Speeds -- Capacity Building in Government: Towards Developing A Standard for A Functional Specialist in AI for Public Services -- On the Feasibility of Machine Learning Models for Customer Spending Prediction Problem -- Forecasting the Opening and Closing Price Trends of Stock Using Hybrid Models and Artificial Intelligence Algorithm -- Artificial Intelligence Use in e-Government Services: A Systematic Interdisciplinary Literature Review -- Face Recognition based on Deep Learning and Data Augmentation -- An Approach for Similarity Vietnamese Documents Detection from English Documents -- Combine Clasification Algorithm and Centernet Model to Predict Trafic Density -- Data Analytics and Healthcare Systems -- Comparison of Health Indicators Construction for Concrete Structure Using Acoustic Emission Hit and Kullback-Leibler Divergence -- Lung and Colon Tumor Classification Based on Transfer Learning-Based Techniques -- An Enhanced Diabetes Mellitus Prediction using Feature Selection-Based Type-2 Fuzzy Model -- A Novel Approach of Using Neural Circuit Policies for COVID-19 Classification on CT-images -- Lung Lesions Segmentation and Classification with Deep Neural Networks -- Security and Data Engineering -- Image Denoising using Fully Connected Network with Reinforcement Learning -- Energy Harvesting Aware for Delay-efficient Data Aggregation in Battery-free IoT Sensors -- Deep Models for Mispronounce Prediction for Vietnamese Learners of English -- An Approach to Hummed-tune and Song Sequences Matching -- 84 Birds Classification using Transfer Learning and EfficientNetB2 -- A Session-based Recommender System for Learning Resources -- A Drowsiness Detection System Based on Eye Landmarks Using IoT -- A Novel Approach for Vietnamese Speech Recognition Using Conformer -- Enhancing obfuscated malware detection with machine learning techniques -- Detecting Intrusion using Multiple Datasets in Software-Defined Networks -- Detecting Exams Fraud Using Transfer Learning and Fine-tuning for ResNet50 -- Shape of Pill Recognition Using Mask R-CNN.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 17

    Computational science -- ICCS 2019 : 19th International Conference, Faro, Portugal, June 11-14, 2019, proceedings. Part I by ICCS (International Conference on Computer Science) Faro, Portugal), SpringerLink (Online service)

    Published: Springer, 2019
    Description: 1 online resource.
    Contents: “…Long Term Implications of Climate Change on Crop Planning /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  18. 18

    Enabling manufacturing competitiveness and economic sustainability : proceedings of the 5th International Conference on Changeable, Agile, Reconfigurable and Virtual Production (CA... by International Conference on Changeable, Agile, Reconfigurable and Virtual Production Munich, Germany, SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xii, 480 pages) : illustrations (some color)
    Contents: “…A Three Level Model for the Design, Planning and Operation of Changeable Production Systems in Distributed Manufacturing /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  19. 19

    Advances in autonomous robotics : joint proceedings of the 13th Annual TAROS Conference and the 15th Annual FIRA RoboWorld Congress, Bristol, UK, August 20-23, 2012 by TAROS 2012 Bristol, England, SpringerLink (Online service), FIRA Roboworld Congress

    Published: Springer, 2012
    Description: 1 online resource (xvi, 469 pages) : illustrations.
    Contents: “…A Novel Adaptive Control Algorithm in Application to a Humanoid Robot Arm /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  20. 20

    Agents and artificial intelligence : third International Conference, ICAART 2011, Rome, Italy, January 28-30, 2011. Revised selected papers by ICAART (Conference) Rome, Italy), SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xiii, 444 pages) : illustrations (black and white).
    SpringerLink - Click here for access
    Conference Proceeding eBook