This completed downloadable of Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceedings of the 15th International Conference on IIH MSP in conjunction with the 12th International Conference on FITAT July 18 20 Jilin China Volume 1 Jeng-Shyang Pan
Instant downloaded Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceedings of the 15th International Conference on IIH MSP in conjunction with the 12th International Conference on FITAT July 18 20 Jilin China Volume 1 Jeng-Shyang Pan pdf docx epub after payment.
Product details:
- ISBN 10: 9811397147
- ISBN 13: 9789811397141
- Author: Jeng-Shyang Pan
The book presents selected papers from the Fifteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the Twelfth International Conference on Frontiers of Information Technology, Applications and Tools, held on July 18–20, 2019 in Jilin, China. Featuring the latest research, it provides valuable information on problem solving and applications for engineers in computer science-related fields, and is a valuable reference resource for academics, industry practitioners and students.
Table of contents:
Part I. Internet of Things and Its Application
1. Designing Intelligent Wearable Product for Elderly Care: A Second User Study
2. Application Research of BIM Technology in Analysis of Green Building HVAC System
3. Research on the Development of Fashion Industry in the “Internet+” Era
4. Design of Mini Pets Feeding Intelligent Home System Based on IoT
5. Study on IoT and Big Data Analysis of Furnace Process Exhaust Gas Leakage
Part II. Information Security and Hiding
6. A Data Hiding Approach Based on Reference-Affected Matrix
7. A Survey of Data Hiding Based on Vector Quantization
8. A Survey of Authentication Protocols in Logistics System
9. Enhanced Secret Hiding Mechanism Based on Genetic Algorithm
10. An Adversarial Attack Method in Gray-Box Setting Oriented to Defenses Based on Image Preprocessing
11. A Collusion Attack on Identity-Based Public Auditing Scheme via Blockchain
12. Research on a Color Image Encryption Algorithm Based on 2D-Logistic
13. UVM-Based CAN IP Verification
14. Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid
15. Digital Audio Watermarking by Quantization Embedding System
16. Digital Audio Watermarking by Amplitude Embedding System
Part III. Machine Learning and Its Applications
17. MSAE: A Multitask Learning Approach for Traffic Flow Prediction Using Deep Neural Network
18. Power Plant Fan Fault Warning Based on Bidirectional Feature Compression and State Estimation
19. Refined Tensor Subspace Analysis
20. FPKC: An Efficient Algorithm for Improving Short-Term Load Forecasting
21. A Novel Approach to Identify Intersection Information via Trajectory Big Data Analysis in Urban Environments
22. Time Series Prediction of Transformer Oil Chromatography Based on Hybrid LSTM Model
23. Parameter Estimation of Redundant System
24. Document Image Retrieval Based on Convolutional Neural Network
25. Deep Residual Network Based on Deep Layer Aggregation for JPEG Images Steganalysis
26. An Efficient Association Rule Mining Method to Predict Diabetes Mellitus: KNHANES 2013–2015
27. A Hybrid Credit Scoring Model Using Neural Networks and Logistic Regression
28. The Early Prediction Acute Myocardial Infarction in Real-Time Data Using an Ensemble Machine Learning Model
29. A Collaborative Filtering Recommendation System for Rating Prediction
30. Comparison of the Framingham Risk Score and Deep Neural Network-Based Coronary Heart Disease Risk Prediction
31. Mining High Quality Medical Phrase from Biomedical Literatures Over Academic Search Engine
32. Current State of E-Commerce in Mongolia: Payment and Delivery
33. The Emerging Trend of Accurate Advertising Communication in the Era of Big Data—The Case of Programmatic, Targeted Advertising
34. Study on Automatic Generation of Teaching Video Subtitles Based on Cloud Computing
35. Attention-Based Multi-fusion Method for Citation Prediction
Part IV. Network Systems and Analysis
36. Using Five Principles of Object-Oriented Design in the Transmission Network Management Information
37. Modbus Protocol Based on the Characteristics of the Transmission of Industrial Data Packet Forgery Tampering and Industrial Security Products Testing
38. Analysis of Time Characteristics of MMS Protocol Transmission in Intelligent Substation
39. Reliability Evaluation Model of Power Communication Network Considering the Importance of Transmission Service
40. Optimal Safety Link Configuration Method for Power Communication Network Considering Global Risk Balance
41. Design of Data Acquisition Software for Steam Turbine Based on Qt/Embedded
42. A Reliable Data Transmission Protocol Based on Network Coding for WSNs
43. Design of Virtual Cloud Desktop System Based on OpenStack
44. Characteristics of Content in Online Interactive Video and Design Strategy
45. Implementation of Asynchronous Cache Memory
Correction to: An Efficient Association Rule Mining Method to Predict Diabetes Mellitus: KNHANES 2013–20
People also search:
advanced intelligence
evidence of intelligence
hiding intelligence
hiding information
knowledge hiding in organizations