• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

    Advances in Artificial Intelligence and Security by Sun, Xingming; Zhang, Xiaorui; Xia, Zhihua; Bertino, Elisa;

    7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

    Series: Communications in Computer and Information Science; 1423;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 106.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        44 374 Ft (42 261 Ft + 5% VAT)
      • Discount 20% (cc. 8 875 Ft off)
      • Discounted price 35 499 Ft (33 809 Ft + 5% VAT)

    44 374 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Long description:

    The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021.

    The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows:

    Part I: artificial intelligence;

    Part II: artificial intelligence; big data; cloud computing and security internet;

    Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

    More

    Table of Contents:

    ​Artificial Intelligence.- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems.- The identification of slope crack based on convolutional neural network.- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function.- Experiments of Federated Learning for COVID-19 Chest X-ray Images.- A Novel Network Covert Channel Model based on Blockchain Transaction Parity.- An Improved CNN Model for Fast Salient Object Detection.- Control system design of transport Robot based on Multi-color Recognition.- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems.- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues.- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization.- Big Data.- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors.- Application of non-negative matrix factorization in faultdetection of distribution network.- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory.- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain.- The Implementation of Aeronautical Information Exchange Model in SWIM.- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image.- Research on the Application of Big Data Analysis in University Library.- Research on Support Vector Machine in Traffic Detection Algorithm.- Application Research on Crop Straw Biomass Waste in Logistics Packaging System.- Research On Data Analysis To Improve English Vocabulary Learning Performance.- Hungarian Method in a car-sharing system application research.- Network Topology Discovery Based on Classification Algorithm.- Research on Feature Words for IoT Device Recognition Based on Word2vec.- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter.- Application of Grey Forecasting Model to CPI Index Forecast.- A Preliminary Study about Star Image Processing Method in Harsh Environment.- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection.- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network.- Evaluation of training effect of new-type professional Farmer based on cloud model.- A study on the characteristics of college students' consumption behavior based on clustering and association rules.- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5.- Exploiting API description information to improve code comment generation.- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process.- Data Processing and Development of Big Data System: A Survey.- Current PHM Surveys for Mechanical Engineering.- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features.- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data.- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students.- Anomaly detection based on isolated forests.- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery.- Design of Abnormal Behavior Detection System in the State Grid Business Office.- Research on the Application of Intelligent Detection Technology in Business Hall System.- Study on Freshness Indicator Agent of Natural Plant Pigment.- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak.- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning.- Cloud Computing and Security.- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency.- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing.- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing.- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges.- Research on Security Mechanism and Forensics of SQLite Database.- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes.- Boolean functions with a few Walsh transform values.- Research on Automation Strategy of Coq.- A Model Design of Cost-effificient Blockchain Framework for E-Government Application.- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing.- A Dynamic Decision-making Method for Endorser Node Selection.- A Proxy Node Resource Load Balancing Strategy Based on the Swift System.- Research on the Picture Database of Minority Emotion.- Instant Messaging Application Traffic Recognition.

    More
    Recently viewed
    previous
    20% %discount
    Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

    Artificial Intelligence and Actuarial Science: Applications and Case Studies from Finance and Insurance

    Trivedi, Sonal; Nallakaruppan, M. K.; Balusamy, Balamurugan;(ed.)

    69 273 HUF

    55 419 HUF

    Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

    Measuring and Modeling Sustainable Development

    Moffatt, I.; Hanley, N.; Wilson, M.D.;

    22 927 HUF

    20 634 HUF

    20% %discount
    Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

    An Introduction To The Method Of Fundamental Solutions

    Cheng, Alexander H-d; Chen, Ching-shyang; Karageorghis, Andreas;

    78 828 HUF

    63 063 HUF

    next