No abstract available.
Proceeding Downloads
A Multi-Head Attention Mechanism Base Multi-Dimensional Data Quality Evaluation Model
High-quality power data is the basis for reliable operation of power systems, efficient data processing, and effective mining of the potential value of power data. How to use big data, artificial intelligence and other technologies to evaluate the ...
Regional Water Resources Allocation Based on Fuzzy Data Mining
To focus on the problem of water shortage and the contradictory relationship between water supply and demand in China, the water supply case sets of each administrative region in Hubei Province were studied in order to provide reference for the policy ...
Traffic Data Prediction with Geometric Algebra Spatial-Temporal Attention Neural Network
Traffic data prediction is complicated due to the changeable and complex traffic conditions and is an important part of Intelligent Transportation System (ITS). With the development of cities, the demand for traffic management is exceeding. Traffic data,...
Light-BCube:A Scalable and High Performance Network Structure for Modular Data Center
With the rapid development of cloud computing services, thousands of data centers are built to meet the demands. A fundamental challenge in data center network is how to interconnect an exponentially increasing number of servers efficiently and provide ...
Research on Intelligent Recommendation of Science and Technology Resource Data Based on Semantic Intelligence Analysis
Aiming at the practical problems such as imperfect semantic analysis function of recommendation service and low sharing degree among scientific data in the existing science and technology resources sharing, the center of knowledge association algorithm ...
An Improved Flower Pollination Algorithm Based on Logistic Chaotic Mapping and Natural Mutation
Function optimization has always been a hotspot in the field of computing. It plays a crucial part in engineering application today. In recent years, many swarm intelligence optimization algorithms have been proposed and applied to solve function ...
KARL: A Cost-effective Routing Algorithm in Fault Tolerant 3D Network-on-Chip via K-means Assisted Reinforcement Learning
In order to guarantee the communication quality of large-scale multicore processors, 3D Network-on-Chip has become the dominate component for interconnecting various IPs via using 3D stacking technology. A cost-effective routing algorithm KARL is ...
Traffic Congestion Propagation Prediction Based on Multi-vector Deep Neural Networks
Traffic congestion propagation prediction plays an important role in congestion control, road network planning and other fields. However, existing deep learning models have not been able to effectively mine the correlation and complex dynamic change ...
Different Approaches of Evolutionary Algorithms to Multiple Objective RCPSP
Task assignments to the project members play a vital role in the project planning process. The project's quality, development time, and cost are criteria to indicate a success or failure project. These are affected by every single arrangement generated ...
Comparing different computation methods of Reduced Google Matrix
The Reduced Google Matrix (RGM) method is used to analyze interactions between a selected subset of nodes within a Big Data network. In this work we aim to compare the convergence and the outcomes of different computation methods of RGM: direct, η and ...
An Improved Bat Algorithm For Solving Nonlinear Algebraic Systems Of Equations
This paper introduces a new hybrid bat algorithm for solving nonlinear equations. Nonlinear equations are often solved by using various optimization algorithms in practice. Bat algorithm is a new intelligent optimization algorithm proposed by Yang in ...
Future of Artificial Intelligence and Machine Learning in Marketing 4.0
The ultimate aim of Marketing 4.0 is to use Machine-to-Machine learning for a superior Human-to-Human experience. Artificial Intelligence (AI) and Machine Learning (ML) play an important role in delivering this experience. This paper addresses the ...
Delay-tolerant Privacy-preserving Continuous Histogram Publishing Method
With the emergence of privacy protection in data analysis, continuous publishing of data stream privacy protection statistical histograms has received widespread attention. Existing researches mainly concentrates on high-real-time publishing scenarios. ...
A Practical Incremental Device Scanning Start-up Time Prediction Scheme for IoT
With the development of IoT, IoT devices are deployed to numerous critical infrastructures, and their security has received wide attention. Using a device fingerprint to identify the device is the key step to improve security. Device fingerprint can be ...
Supervised Information Extraction of Chinese Equipment Maintenance Documents
The service data of equipment maintenance is scattered, complex and uncorrelated, and depends on the experience of experts. This paper focuses on the knowledge extraction technology of equipment maintenance documents. However, equipment maintenance ...
Social Media Rumor Identification Based on Random Forest Classification and Feature Engineering: Case Study on Weibo Platform: Social Media Rumor Identification Based on Random Forest Classification
The development of the Internet is accompanied by the appearance of many problems and challenges, among which the negative impact of rumors on society needs urgently addressing. Weibo platform is virtual and hidden, and has a large number of users. ...
The Influence of Pancasila Education and Religion Education on Value Education for The Students During COVID-19 Pandemic (Case Study: Bina Nusantara University Students)
It must be admitted that with the outbreak of the COVID-19 pandemic, conventional face-to-face learning has been disrupted. Luckily, we have to thank to advances in science and technology, so that the learning system does not have to stop, but can ...
The Semi-definite Programming Model for Optimizing Information Propagation Rate on Social Network Based on the Spectral Graph Theory
In the study of online collaboration, one of the important aspects to optimize information propagation among users is to improve the rate of the propagation besides extending the propagation range, e.g., to deliver the advertisements to given target ...
Deep Learning Based Malware Traffic Classification for Power Internet of Things Network Security
The detection and classification of Malware traffic is an essential building block for the network security of power Internet of Things. Recent studies show that deep learning models can be applied for accurate network traffic classification, but most ...
A Review of Research on Price Forecasting Technology of Fresh Agricultural Products
The agricultural product market is the most basic part of Chinese market economy, and the price of agricultural products is the core element of the agricultural product market, and its future trend development is the focus of attention. Due to the ...