


default search action
ICMTEL 2023: Leicester, UK - Part III
- Bing Wang, Zuojin Hu, Xianwei Jiang

, Yu-Dong Zhang
:
Multimedia Technology and Enhanced Learning - 5th EAI International Conference, ICMTEL 2023, Leicester, UK, April 28-29, 2023, Proceedings, Part III. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 534, Springer 2024, ISBN 978-3-031-50576-8
Data Mining and Machine Learning
- Qi Shen, Yixin Wang, Weiqing Fang, Liqiang Gong, Zhijun Chen, Jianping Li:

Research on Pain Information Management System Based on Deep Learning. 3-10 - Dong Wan, Yuan Xu, Chenxi Li, Yide Zhang:

LS-SVM Assisted Multi-rate INS UWB Integrated Indoor Quadrotor Localization Using Kalman Filter. 11-18 - Licheng Sha, Peng Duan, Xinchen Zhao, Kai Xu, Shaoqing Xi:

Design of Digital Image Information Security Encryption Method Based on Deep Learning. 19-32 - Xinyue Chen:

Design of Iot Data Acquisition System Based on Neural Network Combined with STM32 Microcontroller. 33-45 - Weijia Jin, Shao Gong:

Research on Network Equilibrium Scheduling Method of Water Conservancy Green Product Supply Chain Based on Compound Ant Colony Algorithm. 46-61 - Simayi Xuelati, Junqiang Jia, Shibai Jiang, Xiaokaiti Maihebubai, Tao Wang:

Weak Association Mining Algorithm for Long Distance Wireless Hybrid Transmission Data in Cloud Computing. 62-78 - Xiafu Pan, Chun Zheng:

Detection Method of Large Industrial CT Data Transmission Information Anomaly Based on Association Rules. 79-91 - Shufeng Zhuo, Yingjian Kang:

Design of Intelligent Integration System for Multi-source Industrial Field Data Based on Machine Learning. 92-109 - Jun Ren, Ruidong Wang, Huichen Jia, Yingchen Li, Pei Pei:

Link Transmission Stability Detection Based on Deep Learning in Opportunistic Networks. 110-126 - Ya Xu, Yanmei Sun:

Intelligent Mining Method of New Media Art Image Features Based on Multi-scale Rule Set. 127-138 - Xucheng Wan, Yan Zhao:

Data Security Sharing Method of Opportunistic Network Routing Nodes Based on Knowledge Graph and Big Data. 139-154 - Yan Zhao, Xucheng Wan:

Security Awareness Method of Opportunistic Network Routing Protocol Based on Deep Learning and Knowledge Graph. 155-168 - Haidi Yuan, Wenjing Liu:

Research on Pedestrian Intrusion Detection Method in Coal Mine Based on Deep Learning. 169-183 - Sen Li, Xiaoli Duan:

Personalized Recommendation Method of College Art Education Resources Based on Deep Learning. 184-199 - Xiaoli Duan, Sen Li:

Global Planning Method of Village Public Space Based on Deep Neural Network. 200-214 - Yanfa Xu, Xinran Liu:

A Multi Stage Data Attack Traceability Method Based on Convolutional Neural Network for Industrial Internet. 215-227 - Lei Ma, Jianxing Yang, Jingyu Li:

Machine Learning Based Method for Mining Anomaly Features of Network Multi Source Data. 228-242 - Yanning Zhang, Lei Ma:

Data Anti-jamming Method for Ad Hoc Networks Based on Machine Learning Algorithm. 243-258 - Yuliang Zhang, Ye Wang:

A Data Fusion Method of Information Teaching Feedback Based on Heuristic Firefly Algorithm. 259-272 - Shao Gong, Caofang Long, Weijia Jin:

Research on Database Language Query Method Based on Cloud Computing Platform. 273-286 - Xiaomei Yang:

Reliability Evaluation Method of Intelligent Transportation System Based on Deep Learning. 287-303 - Chen Dai, Yukun Xu, Chao Jiang, Jingrui Yan, Xiaowei Dong:

Forecasting Method of Power Consumption Information for Power Users Based on Cloud Computing. 304-317 - Zheng Zhu, Haibin Chen, Shuang Xiao, Jingrui Yan, Lei Wu:

Power Consumption Behavior Analysis Method Based on Improved Clustering Algorithm of Big Data Technology. 318-331 - Fulong Zhong, Tongxi Lin:

Anomaly Detection of Big Data Based on Improved Fast Density Peak Clustering Algorithm. 332-348 - Chuangji Zhang, Weixuan Lin, Yanli Zhang:

Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm. 349-363 - Aiqing Wang, Jie Gao:

Evaluation Method of Enterprise Circular Economy Development Level Based on AHP Fuzzy Inference. 364-380 - Jie Gao, Aiqing Wang:

Research on Performance Evaluation of Industrial Economic Management Based on Improved Machine Learning. 381-392 - Jin Wang, Yukun Xu, Chao Jiang, Jingrui Yan, Bo Ding, Qiusheng Lin:

Application of Big Data Processing Technology in Power Consumption Information Acquisition. 393-410 - Tongxi Lin, Fulong Zhong:

Task Scheduling Method of Wireless Sensor Multimedia Big Data Parallel Computing Based on Bee Colony Algorithm. 411-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














