Description |
1 online resource (xiv, 412 pages) : illustrations (some color) |
Series |
Lecture notes in computer science ; 11910 |
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
|
Lecture notes in computer science ; 11910.
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
Intro; Preface; Organization; Contents; A Survey of Deep Learning Applied to Story Generation; Abstract; 1 Introduction; 2 Story-Generating Probabilistic Models; 2.1 Theme-Oriented Models; 2.2 Storyline-Oriented Models; 2.3 Human-Machine Interaction-Oriented Models; 3 Comparison of Story-Generating Probabilistic Models; 4 Challenges and Future Directions; 5 Conclusion; Acknowledgment; References; A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates; Abstract; 1 Introduction; 2 Image Preprocessing Methods for Roll Wear Morphology |
|
2.1 Roll Wear Surface Morphology Images2.2 Image Preprocessing Methods; 3 SRWC Scheme: Smart Roll Wear Check Scheme; 3.1 Feature Extraction of Roll Wear Morphology Images; 3.2 Fractal Behavior; 4 Recognition Model Based on Neural Network; 5 Conclusion; References; An Improved Prediction Model for the Network Security Situation; Abstract; 1 Introduction; 2 Building a Predictive Model; 3 MapReduce Distributed Training; 4 SVM Classification; 5 SVM Parameter Selection; 6 Experimental Simulation and Results Analysis; 6.1 Experimental Data Set; 6.2 Model Validation Experiment |
|
6.3 Experimental Results and Analysis7 Conclusions; Acknowledgements; References; A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles; Abstract; 1 Introduction; 2 Quantified Accuracy Measurement Based Localization Algorithm -- QuAMeL; 2.1 Algorithm Overview; 2.2 Initial Status; 2.3 The Underwater Navigation Status; 2.4 Broadcast Coordinate and Accuracy Index Information; 2.5 Coordinate and Accuracy Index Update; 3 Features of the Algorithm; 3.1 The Updating Process of Coordinate and Accuracy Index; 4 Performance Evaluation; 4.1 Simulation Settings |
|
4.2 The Average Updating Times via GPS5 Conclusion; Acknowledgement; References; An Improved Assessment Method for the Network Security Risk; Abstract; 1 Introduction; 2 I-HMM Model Parameters; 2.1 Observed Sequence Acquisition; 2.2 Parameter Estimation Algorithm; 3 Calculation of Network Security Risk Value; 4 Experimental Results and Analysis; 4.1 Experimental Environment Construction; 4.2 Experimental Data Collection and Processing; 5 Conclusion; References; A High-Performance Storage System Based with Dual RAID Engine; Abstract; 1 Introduction; 2 DSH Implementation |
|
2.1 Software Algorithm Implementation2.2 DSH Communication Framework; 3 Experiment Analysis; 4 Future Work; References; An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors; 1 Instruction; 2 Related Work; 2.1 Universal Adversarial Perturbation; 2.2 Fast Feature Fool; 3 Threat Model; 4 Approaches; 4.1 Generation Process of Universal Perturbation; 4.2 Attack Against Object Detectors; 5 Evaluation; 5.1 Setup; 5.2 Success Rate; 6 Conclusions; References; A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle |
Summary |
This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field. -- Provided by publisher |
Notes |
International conference proceedings |
|
Includes author index |
|
Current copyright fee: GBP19.00 42\0. Uk |
|
Online resource; title from PDF title page (SpringerLink, viewed November 5, 2019) |
Subject |
Cloud computing -- Congresses
|
|
Computer security -- Congresses
|
|
Computer networks -- Congresses
|
|
Cloud computing
|
|
Computer networks
|
|
Computer security
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Qiu, Meikang, editor.
|
ISBN |
9783030341398 |
|
3030341399 |
|