책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 데이터 프로세싱
· ISBN : 9789819708260
· 쪽수 : 360쪽
· 출판일 : 2024-03-01
목차
Intelligent Control and Automation.-?Advancing Short-term Traffic Congestion Prediction: Navigating Challenges?in Learning-Based Approaches.-?Interval Observers Design for Discrete-time Linear Systems with?Uncertainties.- Transformer-based Multi-Industry Electricity Demand Forecasting.-?Method of visual formation control for large group of AUV in environment?with obstacles.-?A Broader Study of Spectral Missing in Multi-Spectral Vehicle Re-?Identification.-?TimesNet Model for Multi-Industry ElectricityDemand Forecasting.-?Design and utilization of an auto-visual-inspection composite system for?suspension cables with fast flaw identification.-?A Critical Review of Multi Criteria Decision Analysis Method for Decision??Making and Prediction in Big Data Healthcare Applications.-?A New and Efficient Dormitory Management System.-?Edge Collaborative Assisted Caching Content Placement Optimization??Strategy Based on DDSG.-?Design and Implementation of CNN-based DTTB Image Intelligent Fault?Diagnosis Platform.-?Smart power safety hazard inspection system based on YOLOv7.-?A Defect Detection Method of Drainage Pipe Based on Improved YOLOv5s.-?Visual servo control system for AUV stabilization.-?Research on fuzzy weighted controller for battery discharge of dual-channel?dual-active bridge.-?Multi-scale Texture Network for Industrial Surface Defect Detection.-?Machine Learning.-?Large-Scale Data Challenges: Instability in Statistical Learning.-?Deepfake Detection Performance Evaluation and Enhancement through??Parameter Optimization.-?Prediction Interval of Principal Component Regression with Applications to??Molecular Descriptors Datasets.-?Tourist Attraction Recommendation System based on Django and??Collaborative Filtering.-?Effective Rules for a Rule-Based SIEM System in De-tecting DoS Attacks:An Association Rule Mining Ap-proach.-?Beibu Gulf Marine Ranch: Utilizing BeiDou Grid Code and Multi-System??Integration for Modernized Management and Monitoring.-?A member inference attack defense method based on Differential Privacy and?Data Enhancement.-?Air Defense Deployment of Anti-reconnaissance Based on Immune?Optimization Algorithm with Nested Double Particle Swarm.-?Relevant Tag Extraction based on Image Visual Content.-?Natural Language Processing and Computational Linguistics.-?STTS: A Novel Span-Based Approach for Topic-Aware Text Segmentation.-?BERT-KRS: A BERT-based Model for Knowledge-grounded Response?Selection in Retrieval-based Chatbots.-?An Assembly Instruction Question Answering System Based on Knowledge?Graph.-?Improving Natural Language Inference with Residual Attention.-?Enhancing Reasoning Pathways for Power Defect Analysis using CoT and?Role-Play Prompt.? ??














