Data Science
Springer Nature (Verlag)
978-981-97-8745-6 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
The 74 full papers and 3 short papers presented in these three volumes were carefully reviewed and selected from 249 submissions.
The papers are organized in the following topical sections:
Part I: Novel methods or tools used in big data and its applications; applications of data science.
Part II: Education research, methods and materials for data science and engine; data security and privacy; big data mining and knowledge management.
Part III: Infrastructure for data science; social media and recommendation system; multimedia data management and analysis.
.- Education research, methods and materials for data science and engine.
.- An empirical study of the factors influencing the improvement of education
quality within higher education institutions·
.- Study on the Intercultural Competence of Students in Hainan Vocational College.
.- Study on the Communicative Competence of Students of Tourism-related Majors
in Hainan Vocational Colleges.
.- Research on the Learning Adaptability and Learning Effectiveness of College
Students under the Background of Digital Education.
.- Research on the Adaptability of Vocational College Majors and Industry Empirical
Study Based on 14 Vocational Colleges in Hainan,China.
.- Practice of the Campus Data Middle Platform Based on Lakehouse Integrated
Architecture.
.- Data Security and Privacy.
.- Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption
and Multi-MSB Prediction.
.- QR code digital watermarking algorithm based on GWO.
.- Fast CKKS Algorithm in the SEAL Library.
.- A Transformer-based Video Colorization Method Fusing Local Self-Attention and
Bidirectional Optical Flow.
.- An NTRU Lattice-Based Chameleon Hash Scheme for Redactable Blockchain Applications.
.- Traceable Decentralized Policy-Based Chameleon Hash Scheme for Blockchain
Rewriting·
.- SECURE IDENTITY AUTHENTICATION PROTOCOL BASED ON BLOCKCHAIN
IN SMART HOME.
.- False Data Injection Attack Detection Method Based on Long Time Series
Prediction.
.- A Hybrid Iris Recognition System Model based on Presentation Attack Detection
and Traffic Monitoring Module on AIoT System.
.- Big Data Mining and Knowledge Management.
.- Leveraging Spatial Characteristics in Trajectory Compression: An Angle-based
Bounded-error Method.
.- HENF: Hierarchical Entity Neighbor Multi-Relational Fusion Network for
Knowledge Graph Completion.
.- TCB Intrusion Detection Method Based on Data Enhancement.
.- Multi-source Heterogeneous Data Joint Diagnosis Method for Transformers Based
on D-S Evidence Theory.
.- Progressive Federated Learning Scheme Based on Model Pruning.
.- Privacy Protection Data Aggregation Scheme Against Quantum Attacks.
.- LOCATION DATA QUADTREE PARTITIONINGALGORITHM BASED ON
DIFFERENTIAL PRIVACY.
.- RLART: An Adaptive Radix Tree Based on Deep Reinforcement Learning.
Erscheinungsdatum | 31.10.2024 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | 63 Illustrations, color; 93 Illustrations, black and white; XVII, 347 p. 156 illus., 63 illus. in color. |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
ISBN-10 | 981-97-8745-9 / 9819787459 |
ISBN-13 | 978-981-97-8745-6 / 9789819787456 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich