editors, Jason C. Hung, Neil Y. Yen, Kuan-Ching Li.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Singapore :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2018.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource
SERIES
Series Title
Lecture notes in electrical engineering ;
Volume Designation
volume 542
CONTENTS NOTE
Text of Note
Intro; Contents; Research on Application's Credibility Test Method and Calculation Method Based on Application Behavior Declaration; Abstract; 1 Introduction; 2 Design of Credibility Verification Method; 2.1 Definition of ABD; 2.2 Application Implement Verification Module; 2.3 Tracking Module Records Actions of Application; 2.4 Verify Program Analysis Tracking Information; 3 Credibility Verification; 3.1 Standard of Credibility Verification; 3.2 Recessive Parameter Model and Calculation; 3.3 Credibility Judgment of Similar Behavior; 4 Conclusion; References
Text of Note
2 Physics structure3 Deep Reinforcement Learning Model; 4 Experiments and Results Analysis; 4.1 Experimental Environment; 4.2 Experimental Model Setup; 4.3 Results Analysis; 5 Conclusion; References; Predicting Students' Academic Performance Using Utility Based Educational Data Mining; Abstract; 1 Introduction; 2 Literature Review; 3 Materials and Methods; 4 Results and Discussion; 5 Conclusion; 6 Future Work; Acknowledgements; References; Theme Evolution Analysis of Public Security Events Based on Hierarchical Dirichlet Process; Abstract; 1 Introduction; 2 Research Background; 2.1 HDP
Text of Note
2.2 The Stick-Breaking Construction3 MD-HDP Theme Generation Model; 3.1 Model Frame; 3.2 Model of Stick-Breaking Construction; 3.3 Thematic Content Evolutionary Analyze Method; 4 Experiments; 4.1 Data Set; 4.2 Experimental Setting; 4.3 Thematic Evolution Analysis of Data Setting; 4.4 Model Effect Evaluation; 5 Conclusion and Future Works; Acknowledgements; References; Recurrent Neural Networks for Analysis and Automated Air Pollution Forecasting; 1 Introduction; 2 Background Review and Related Work; 2.1 Rhadoop; 2.2 Visualizations R Using the Shiny Server; 2.3 Recurrent Neural Networks
Text of Note
2.4 Realted Work3 System Design and Implementation; 3.1 System Architecture; 3.2 Lag-Time in RNN for Prediction; 3.3 RNN Model Optimization; 4 Experimental Environment and Results; 4.1 Experimental Environment; 4.2 RNN Parameters Optimization; 4.3 RNN Model Visualization; 5 Conclusion; References; A Social Influence Account of Problematic Smartphone Use; Abstract; 1 Introduction; 2 Literature Review; 3 Method; 4 Analysis and Conclusion; References; Simulation Analysis of Information-Based Animal Observation System; Abstract; 1 Introduction; 2 Related Work; 3 Model Development; 4 Analysis
Text of Note
The Selection of DNA Aptamers Against the Fc Region of Human IgGAbstract; 1 Introduction; 2 Materials and Methods; 2.1 Materials and Reagents; 2.2 Parent Sequence and Mutation Rules for Child Sequences; 2.3 Computational Assay; 2.4 ELISA Test; 3 Results and Discussions; 3.1 Molecular Simulation Results for Apt 8 and Apt 8_DNA; 3.2 The Candidate Sequences Predicted by Molecular Simulations; 3.3 Results of ELISA Assay; 4 Conclusions; Acknowledgements; References; Application of Deep Reinforcement Learning in Beam Offset Calibration of MEBT at C-ADS Injector-II; 1 Introduction
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
This book presents the proceedings of the 6th International Conference on Frontier Computing, held in Kuala Lumpur, Malaysia on July 3-6, 2018, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The contributions cover a wide range of topics: database and data mining, networking and communications, web and internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions. The book is a valuable resource for students, researchers and professionals, and also offers a useful reference guide for newcomers to the field.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9789811336485
OTHER EDITION IN ANOTHER MEDIUM
International Standard Book Number
9789811336478
International Standard Book Number
9789811336492
PARALLEL TITLE PROPER
Parallel Title
FC 2018
TOPICAL NAME USED AS SUBJECT
Computer science, Congresses.
Databases, Congresses.
Information technology, Congresses.
Computer science.
COMPUTERS-- Computer Literacy.
COMPUTERS-- Computer Science.
COMPUTERS-- Data Processing.
COMPUTERS-- Hardware-- General.
COMPUTERS-- Information Technology.
COMPUTERS-- Machine Theory.
COMPUTERS-- Reference.
Databases.
Information technology.
(SUBJECT CATEGORY (Provisional
COM-- 013000
COM-- 014000
COM-- 018000
COM-- 032000
COM-- 037000
COM-- 052000
COM-- 067000
DEWEY DECIMAL CLASSIFICATION
Number
004
.
6
Edition
23
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA75
.
5
PERSONAL NAME - ALTERNATIVE RESPONSIBILITY
Hung, Jason C.,1973-
Kuai, Lin
Yen, Neil Y.
CORPORATE BODY NAME - PRIMARY RESPONSIBILITY
International Conference on Frontier Computing(7th :2018 :, Kuala Lumpur, Malaysia)