Data Information in Online Environments (eBook, PDF)
5th International Conference, DIONE 2024, Sanya, China, November 11, 2024, Proceedings
Redaktion: Yu, Weng; Xuan, Liu
60,95 €
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
60,95 €
Als Download kaufen
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Data Information in Online Environments (eBook, PDF)
5th International Conference, DIONE 2024, Sanya, China, November 11, 2024, Proceedings
Redaktion: Yu, Weng; Xuan, Liu
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 5th International Conference on Data and Information in Online, DIONE 2024, held in Sanya, China, during November 1-3, 2024.
The 34 full papers were presented in this volume were carefully reviewed and selected from 99 submissions. They focus on Machine Learning and Artificial Intelligence; Optimization and Intelligent Systems; Privacy, Security, and Risk Management; Emerging Applications and Interdisciplinary Research.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 55.17MB
Andere Kunden interessierten sich auch für
Recent Trends in Advanced Computing (eBook, PDF)72,95 €
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII (eBook, PDF)40,95 €
Transactions on Large-Scale Data- and Knowledge-Centered Systems LIII (eBook, PDF)72,95 €
Intelligent Systems and Data Science (eBook, PDF)96,95 €
Intelligent Systems and Data Science (eBook, PDF)96,95 €
Information Technology for Management: Intelligent Alignment of IT with Business and Society (eBook, PDF)96,95 €
Business Process Management: Responsible BPM Forum, Process Technology Forum, Educators Forum (eBook, PDF)64,95 €-
-
-
This book constitutes the refereed proceedings of the 5th International Conference on Data and Information in Online, DIONE 2024, held in Sanya, China, during November 1-3, 2024.
The 34 full papers were presented in this volume were carefully reviewed and selected from 99 submissions. They focus on Machine Learning and Artificial Intelligence; Optimization and Intelligent Systems; Privacy, Security, and Risk Management; Emerging Applications and Interdisciplinary Research.
The 34 full papers were presented in this volume were carefully reviewed and selected from 99 submissions. They focus on Machine Learning and Artificial Intelligence; Optimization and Intelligent Systems; Privacy, Security, and Risk Management; Emerging Applications and Interdisciplinary Research.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 588
- Erscheinungstermin: 29. August 2025
- Englisch
- ISBN-13: 9783031973529
- Artikelnr.: 75320454
- Verlag: Springer International Publishing
- Seitenzahl: 588
- Erscheinungstermin: 29. August 2025
- Englisch
- ISBN-13: 9783031973529
- Artikelnr.: 75320454
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Machine Learning and Artificial Intelligence.
.- Multimodal Bind for Few-Shot SAR Object Detection in Drone Remote Sensing Images.
.- SAR Moving Target Detection Based on Denoising Diffusion Probabilistic Models.
.- Sequential Recommendation with Hierarchical Filtering and Long- and Short-Term Preference Contrastive Learning.
.- Crossformer Network for RUL Prediction of Lithium-Ion Batteries.
.- KV-KBVQA: Effective KAN Vision Transformer for Kowledge-based Visual Question Answering with Residual Cross-Modal Attention.
.- Criss-cross attention Enhanced Transformer for Image Captioning.
.- Are Fact-Checking Tools Helpful? An Exploration of the Usability of Google Fact Check.
.- A Comparative Study of Machine Learning and Neural Network Models for Phishing Detection.
.- Advancements in Machine Learning Techniques for Diabetes Mellitus: A Review of Progression, Challenges and Future Directions.
.- Optimization and Intelligent Systems.
.- A Method for FlowShop Scheduling Problem by Using Hybrid Ant Algorithm.
.- Target Controllability and Controllability of Second-Order Multi-Agent Systems.
.- Global Citation Recommendation with Context-Aware Temporal Attention Long Short-Term Memory and Filtering Enhanced Learning Module.
.- A Contrastive Learning Method for Ordinary Differential Equation-based Collaborative Filtering.
.- University Network Suggestion Box Based on Text Analysis and WeChat Mini Program.
.- Study of Routing Algorithm for GEO-LEO Two-layer Satellite Network based-on GEO Satellite Congestion Management.
.- Research on overtemparture Diagnosis of Boiler High -Temparture Reheater Based on Improved LSTM - FCN.
.- Defect Detection Method for Power Transmission and Transformation Equipment Based on SAM Data Augmentation and Deformable Convolution.
.- Privacy, Security, and Risk Management.
.- Further Exploration of the REM Model on Community Structure Deception.
.- U-CKAM based on C-KAN and MRF for Medical Image Segmentation.
.- A Novel Feature Clustering Approach for Comprehensive Network Asset Discovery: Methods, Implementation, and Validation.
.- PDP-GAN-DD: Personalized Differential Privacy Generative Adversarial Network Algorithm for Data Desensitization.
.- Medical Data Risk Assessment Method Based on Improved Evidence Theory and Analytic Hierarchy Process.
.- Optimizing ECDSA Algorithm Parameters via Safe Prime Generation integrated on EJBCA.
.- Network intrusion detection based on time heterogeneous graph representation.
.- Emerging Applications and Interdisciplinary Research.
.- The Construction of Community Resilience Evaluation System under the Background of Digital Transformation.
.- SVTR-V3: An Improved Model Based on a Single Visual Recognition Network.
.- Research on the Mechanism of Digital Economy Promoting Resilient Community Construction Empirical Evidence Based on China s Provincial Panel Data.
.- Rule-Based Learning for Explainable XGBoost Internal Threat Detection.
.- A Trusted Measurement Model for The Utilization of Medical Network Resources Based on User Behavior Portraits.
.- Research on classroom behavior recognition based on improved YOLOv8s algorithm.
.- Research on Emotional Cognitive Analysis Based on Knowledge Graph and Dynamic Multi-modal Fusion.
.- Case Retrieval Based on Multi-Dimensional Information Reordering.
.- A System Design for Lung Field Segmentation and Pneumonia Recognition Using U-Net++ and Improved Inception-v3.
.- An Approach to Inpainting Damaged Dunhuang Murals Based on Classifier-Guided Improved Diffusion Model.
.- Multimodal Bind for Few-Shot SAR Object Detection in Drone Remote Sensing Images.
.- SAR Moving Target Detection Based on Denoising Diffusion Probabilistic Models.
.- Sequential Recommendation with Hierarchical Filtering and Long- and Short-Term Preference Contrastive Learning.
.- Crossformer Network for RUL Prediction of Lithium-Ion Batteries.
.- KV-KBVQA: Effective KAN Vision Transformer for Kowledge-based Visual Question Answering with Residual Cross-Modal Attention.
.- Criss-cross attention Enhanced Transformer for Image Captioning.
.- Are Fact-Checking Tools Helpful? An Exploration of the Usability of Google Fact Check.
.- A Comparative Study of Machine Learning and Neural Network Models for Phishing Detection.
.- Advancements in Machine Learning Techniques for Diabetes Mellitus: A Review of Progression, Challenges and Future Directions.
.- Optimization and Intelligent Systems.
.- A Method for FlowShop Scheduling Problem by Using Hybrid Ant Algorithm.
.- Target Controllability and Controllability of Second-Order Multi-Agent Systems.
.- Global Citation Recommendation with Context-Aware Temporal Attention Long Short-Term Memory and Filtering Enhanced Learning Module.
.- A Contrastive Learning Method for Ordinary Differential Equation-based Collaborative Filtering.
.- University Network Suggestion Box Based on Text Analysis and WeChat Mini Program.
.- Study of Routing Algorithm for GEO-LEO Two-layer Satellite Network based-on GEO Satellite Congestion Management.
.- Research on overtemparture Diagnosis of Boiler High -Temparture Reheater Based on Improved LSTM - FCN.
.- Defect Detection Method for Power Transmission and Transformation Equipment Based on SAM Data Augmentation and Deformable Convolution.
.- Privacy, Security, and Risk Management.
.- Further Exploration of the REM Model on Community Structure Deception.
.- U-CKAM based on C-KAN and MRF for Medical Image Segmentation.
.- A Novel Feature Clustering Approach for Comprehensive Network Asset Discovery: Methods, Implementation, and Validation.
.- PDP-GAN-DD: Personalized Differential Privacy Generative Adversarial Network Algorithm for Data Desensitization.
.- Medical Data Risk Assessment Method Based on Improved Evidence Theory and Analytic Hierarchy Process.
.- Optimizing ECDSA Algorithm Parameters via Safe Prime Generation integrated on EJBCA.
.- Network intrusion detection based on time heterogeneous graph representation.
.- Emerging Applications and Interdisciplinary Research.
.- The Construction of Community Resilience Evaluation System under the Background of Digital Transformation.
.- SVTR-V3: An Improved Model Based on a Single Visual Recognition Network.
.- Research on the Mechanism of Digital Economy Promoting Resilient Community Construction Empirical Evidence Based on China s Provincial Panel Data.
.- Rule-Based Learning for Explainable XGBoost Internal Threat Detection.
.- A Trusted Measurement Model for The Utilization of Medical Network Resources Based on User Behavior Portraits.
.- Research on classroom behavior recognition based on improved YOLOv8s algorithm.
.- Research on Emotional Cognitive Analysis Based on Knowledge Graph and Dynamic Multi-modal Fusion.
.- Case Retrieval Based on Multi-Dimensional Information Reordering.
.- A System Design for Lung Field Segmentation and Pneumonia Recognition Using U-Net++ and Improved Inception-v3.
.- An Approach to Inpainting Damaged Dunhuang Murals Based on Classifier-Guided Improved Diffusion Model.
.- Machine Learning and Artificial Intelligence.
.- Multimodal Bind for Few-Shot SAR Object Detection in Drone Remote Sensing Images.
.- SAR Moving Target Detection Based on Denoising Diffusion Probabilistic Models.
.- Sequential Recommendation with Hierarchical Filtering and Long- and Short-Term Preference Contrastive Learning.
.- Crossformer Network for RUL Prediction of Lithium-Ion Batteries.
.- KV-KBVQA: Effective KAN Vision Transformer for Kowledge-based Visual Question Answering with Residual Cross-Modal Attention.
.- Criss-cross attention Enhanced Transformer for Image Captioning.
.- Are Fact-Checking Tools Helpful? An Exploration of the Usability of Google Fact Check.
.- A Comparative Study of Machine Learning and Neural Network Models for Phishing Detection.
.- Advancements in Machine Learning Techniques for Diabetes Mellitus: A Review of Progression, Challenges and Future Directions.
.- Optimization and Intelligent Systems.
.- A Method for FlowShop Scheduling Problem by Using Hybrid Ant Algorithm.
.- Target Controllability and Controllability of Second-Order Multi-Agent Systems.
.- Global Citation Recommendation with Context-Aware Temporal Attention Long Short-Term Memory and Filtering Enhanced Learning Module.
.- A Contrastive Learning Method for Ordinary Differential Equation-based Collaborative Filtering.
.- University Network Suggestion Box Based on Text Analysis and WeChat Mini Program.
.- Study of Routing Algorithm for GEO-LEO Two-layer Satellite Network based-on GEO Satellite Congestion Management.
.- Research on overtemparture Diagnosis of Boiler High -Temparture Reheater Based on Improved LSTM - FCN.
.- Defect Detection Method for Power Transmission and Transformation Equipment Based on SAM Data Augmentation and Deformable Convolution.
.- Privacy, Security, and Risk Management.
.- Further Exploration of the REM Model on Community Structure Deception.
.- U-CKAM based on C-KAN and MRF for Medical Image Segmentation.
.- A Novel Feature Clustering Approach for Comprehensive Network Asset Discovery: Methods, Implementation, and Validation.
.- PDP-GAN-DD: Personalized Differential Privacy Generative Adversarial Network Algorithm for Data Desensitization.
.- Medical Data Risk Assessment Method Based on Improved Evidence Theory and Analytic Hierarchy Process.
.- Optimizing ECDSA Algorithm Parameters via Safe Prime Generation integrated on EJBCA.
.- Network intrusion detection based on time heterogeneous graph representation.
.- Emerging Applications and Interdisciplinary Research.
.- The Construction of Community Resilience Evaluation System under the Background of Digital Transformation.
.- SVTR-V3: An Improved Model Based on a Single Visual Recognition Network.
.- Research on the Mechanism of Digital Economy Promoting Resilient Community Construction Empirical Evidence Based on China s Provincial Panel Data.
.- Rule-Based Learning for Explainable XGBoost Internal Threat Detection.
.- A Trusted Measurement Model for The Utilization of Medical Network Resources Based on User Behavior Portraits.
.- Research on classroom behavior recognition based on improved YOLOv8s algorithm.
.- Research on Emotional Cognitive Analysis Based on Knowledge Graph and Dynamic Multi-modal Fusion.
.- Case Retrieval Based on Multi-Dimensional Information Reordering.
.- A System Design for Lung Field Segmentation and Pneumonia Recognition Using U-Net++ and Improved Inception-v3.
.- An Approach to Inpainting Damaged Dunhuang Murals Based on Classifier-Guided Improved Diffusion Model.
.- Multimodal Bind for Few-Shot SAR Object Detection in Drone Remote Sensing Images.
.- SAR Moving Target Detection Based on Denoising Diffusion Probabilistic Models.
.- Sequential Recommendation with Hierarchical Filtering and Long- and Short-Term Preference Contrastive Learning.
.- Crossformer Network for RUL Prediction of Lithium-Ion Batteries.
.- KV-KBVQA: Effective KAN Vision Transformer for Kowledge-based Visual Question Answering with Residual Cross-Modal Attention.
.- Criss-cross attention Enhanced Transformer for Image Captioning.
.- Are Fact-Checking Tools Helpful? An Exploration of the Usability of Google Fact Check.
.- A Comparative Study of Machine Learning and Neural Network Models for Phishing Detection.
.- Advancements in Machine Learning Techniques for Diabetes Mellitus: A Review of Progression, Challenges and Future Directions.
.- Optimization and Intelligent Systems.
.- A Method for FlowShop Scheduling Problem by Using Hybrid Ant Algorithm.
.- Target Controllability and Controllability of Second-Order Multi-Agent Systems.
.- Global Citation Recommendation with Context-Aware Temporal Attention Long Short-Term Memory and Filtering Enhanced Learning Module.
.- A Contrastive Learning Method for Ordinary Differential Equation-based Collaborative Filtering.
.- University Network Suggestion Box Based on Text Analysis and WeChat Mini Program.
.- Study of Routing Algorithm for GEO-LEO Two-layer Satellite Network based-on GEO Satellite Congestion Management.
.- Research on overtemparture Diagnosis of Boiler High -Temparture Reheater Based on Improved LSTM - FCN.
.- Defect Detection Method for Power Transmission and Transformation Equipment Based on SAM Data Augmentation and Deformable Convolution.
.- Privacy, Security, and Risk Management.
.- Further Exploration of the REM Model on Community Structure Deception.
.- U-CKAM based on C-KAN and MRF for Medical Image Segmentation.
.- A Novel Feature Clustering Approach for Comprehensive Network Asset Discovery: Methods, Implementation, and Validation.
.- PDP-GAN-DD: Personalized Differential Privacy Generative Adversarial Network Algorithm for Data Desensitization.
.- Medical Data Risk Assessment Method Based on Improved Evidence Theory and Analytic Hierarchy Process.
.- Optimizing ECDSA Algorithm Parameters via Safe Prime Generation integrated on EJBCA.
.- Network intrusion detection based on time heterogeneous graph representation.
.- Emerging Applications and Interdisciplinary Research.
.- The Construction of Community Resilience Evaluation System under the Background of Digital Transformation.
.- SVTR-V3: An Improved Model Based on a Single Visual Recognition Network.
.- Research on the Mechanism of Digital Economy Promoting Resilient Community Construction Empirical Evidence Based on China s Provincial Panel Data.
.- Rule-Based Learning for Explainable XGBoost Internal Threat Detection.
.- A Trusted Measurement Model for The Utilization of Medical Network Resources Based on User Behavior Portraits.
.- Research on classroom behavior recognition based on improved YOLOv8s algorithm.
.- Research on Emotional Cognitive Analysis Based on Knowledge Graph and Dynamic Multi-modal Fusion.
.- Case Retrieval Based on Multi-Dimensional Information Reordering.
.- A System Design for Lung Field Segmentation and Pneumonia Recognition Using U-Net++ and Improved Inception-v3.
.- An Approach to Inpainting Damaged Dunhuang Murals Based on Classifier-Guided Improved Diffusion Model.







