소장자료

>>
소장자료
>
000 nam5i
001 2210080934611
003 DE-He213
005 20250321105417
007 cr nn 008mamaa
008 240726s2024 si | s |||| 0|eng d
020 a97898197548929978-981-97-5489-2
024 a10.1007/978-981-97-5489-22doi
040 a221008
050 aQ334-342
050 aTA347.A78
072 aUYQ2bicssc
072 aCOM0040002bisacsh
072 aUYQ2thema
082 a006.3223
245 00 aKnowledge Science, Engineering and Managementh[electronic resource] :b17th International Conference, KSEM 2024, Birmingham, UK, August 16–18, 2024, Proceedings, Part V /cedited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang.
250 a1st ed. 2024.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2024.
300 aXIII, 328 p. 99 illus., 83 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aLecture Notes in Artificial Intelligence,x2945-9141 ;v14888
505 a -- Special Track. -- Adversary and Attention Guided Knowledge Graph Reasoning based on Reinforcement Learning. -- Evaluating GPT’s Programming Capability through CodeWars’ Katas. -- An Online Portfolio Selection Algorithm with Dynamic Coreset Construction. -- Interval-valued Fuzzy Portfolio decision Model with Transaction Cost and Liquidity Constraint. -- Active Learning for Low-Resource Project-Specific Code Summarization. -- A Survey of Game-Theoretic Methods for Controlling COVID-19. -- ComPAT: a Compiler Principles course AssisTant. -- Tram Air Conditioning Fault Prediction Using Machine learning. -- Lexicon Graph Adapter based BERT Model For Chinese Named Entity Recognition. -- Insider Threat Defense Strategies: Survey and Knowledge Integration. -- GA-MEPS: Multiple Experts Portfolio Selection Based on Genetic Algorithm. -- Deep Learning and Machine Learning-Based Approaches to Inferring Social Media Network Users’ Interests from a Missing Data Issus. -- Customer Segmentation for Telecommunication using Machine Learning. -- DP-MFRNN: Difficulty Prediction for Examination Questions Based on Neural Network Framework. -- Causal Relationship Extraction Combined Boundary Detection and Information Interaction. -- Profit Maximization in Edge-enabled Multimedia Data Market: A Game-based Pricing Approach. -- Reinforcement learning for scientific application: A survey. -- Zunna: A New Browser Extension for Protecting Personal Data. -- HRTC:A Triple Joint Extraction Model Based on Cyber Threat Intelligence. -- Personalized Image Aesthetics Assessment based onTheme and Personality. -- A Spatio-temporal Neural Network for Medical Insurance Fraud Detection. -- Exploring Language Diversity to Improve Neural Text Generation. -- Diffusion Review-based Recommendation. -- IntellectSeeker: A Personalized Literature Management System with the Probabilistic Model and Large Language Model. -- A novel network intrusion detection method for unbalanced data in open scenarios. -- Explainable Knowledge-Based Learning For Online Medical Question Answering. -- Energy consumption prediction method for refrigeration systems based on adversarial networks and Transformer networks. -- P-Vit: A simplified Vision Transformer model based on FFN and Simple Attention.
520 aThe five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16–18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks.
650 aArtificial intelligence.
650 aComputer engineering.
650 aComputer networks .
650 aComputers.
650 aInformation technologyxManagement.
650 aSocial sciencesxData processing.
650 aApplication software.
650 aArtificial Intelligence.
650 aComputer Engineering and Networks.
650 aComputing Milieux.
650 aComputer Application in Administrative Data Processing.
650 aComputer Application in Social and Behavioral Sciences.
650 aComputer and Information Systems Applications.
700 aCao, Cungeng.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aChen, Huajun.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aZhao, Liang.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aArshad, Junaid.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aAsyhari, Taufiq.eeditor.0(orcid)0000-0002-3023-82851https://orcid.org/0000-0002-3023-82854edt4http://id.loc.gov/vocabulary/relators/edt
700 aWang, Yonghao.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819754885
776 iPrinted edition:z9789819754908
830 aLecture Notes in Artificial Intelligence,x2945-9141 ;v14888
856 uhttps://doi.org/10.1007/978-981-97-5489-2
912 aZDB-2-SCS
912 aZDB-2-SXCS
912 aZDB-2-LNC
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Knowledge Science, Engineering and Management[electronic resource] :17th International Conference, KSEM 2024, Birmingham, UK, August 16–18, 2024, Proceedings, Part V /edited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang
종류
전자책
서명
Knowledge Science, Engineering and Management[electronic resource] :17th International Conference, KSEM 2024, Birmingham, UK, August 16–18, 2024, Proceedings, Part V /edited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang
판 사항
1st ed. 2024.
형태사항
XIII, 328 p 99 illus, 83 illus in color online resource.
주기사항
The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16–18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks.
내용주기
/ Special Track. / Adversary and Attention Guided Knowledge Graph Reasoning based on Reinforcement Learning. / Evaluating GPT’s Programming Capability through CodeWars’ Katas. / An Online Portfolio Selection Algorithm with Dynamic Coreset Construction. / Interval-valued Fuzzy Portfolio decision Model with Transaction Cost and Liquidity Constraint. / Active Learning for Low-Resource Project-Specific Code Summarization. / A Survey of Game-Theoretic Methods for Controlling COVID-19. / ComPAT: a Compiler Principles course AssisTant. / Tram Air Conditioning Fault Prediction Using Machine learning. / Lexicon Graph Adapter based BERT Model For Chinese Named Entity Recognition. / Insider Threat Defense Strategies: Survey and Knowledge Integration. / GA-MEPS: Multiple Experts Portfolio Selection Based on Genetic Algorithm. / Deep Learning and Machine Learning-Based Approaches to Inferring Social Media Network Users’ Interests from a Missing Data Issus. / Customer Segmentation for Telecommunication using Machine Learning. / DP-MFRNN: Difficulty Prediction for Examination Questions Based on Neural Network Framework. / Causal Relationship Extraction Combined Boundary Detection and Information Interaction. / Profit Maximization in Edge-enabled Multimedia Data Market: A Game-based Pricing Approach. / Reinforcement learning for scientific application: A survey. / Zunna: A New Browser Extension for Protecting Personal Data. / HRTC:A Triple Joint Extraction Model Based on Cyber Threat Intelligence. / Personalized Image Aesthetics Assessment based onTheme and Personality. / A Spatio-temporal Neural Network for Medical Insurance Fraud Detection. / Exploring Language Diversity to Improve Neural Text Generation. / Diffusion Review-based Recommendation. / IntellectSeeker: A Personalized Literature Management System with the Probabilistic Model and Large Language Model. / A novel network intrusion detection method for unbalanced data in open scenarios. / Explainable Knowledge-Based Learning For Online Medical Question Answering. / Energy consumption prediction method for refrigeration systems based on adversarial networks and Transformer networks. / P-Vit: A simplified Vision Transformer model based on FFN and Simple Attention.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기