Proceedings of the 13th International Conference on Computer Engineering and Networks Volume II /
Proceedings of the 13th International Conference on Computer Engineering and Networks Volume II / [electronic resource] :
edited by Yonghong Zhang, Lianyong Qi, Qi Liu, Guangqiang Yin, Xiaodong Liu.
- 1st ed. 2024.
- XII, 603 p. 255 illus., 183 illus. in color. online resource.
- Lecture Notes in Electrical Engineering, 1126 1876-1119 ; .
- Lecture Notes in Electrical Engineering, 1126 .
Preconditioned USSOR Iterative Method for H-matrix Linear Systems -- Research on Airport Gate Allocation Problem based on NSGA-Ⅱ Algorithm -- IntentDetector: Research on Intent vulnerability mining technology based on Fuzzing technology -- A Method for Measuring the Heterogeneity of Mimicry Defense Executor Set -- A Review of Research on Instance Segmentation Based on Deep Learning -- An Event Relation Extraction Model for Database Alarm Based on Type-Guided Graph Attention Network and CNN -- Vector quantization improvement algorithm for controlling average distortion in the context of big data -- Double-blind Quantum Identity Authentication Protocol Based on Scalar Product Computation -- Chaotic System Image Encryption Algorithm Base RSA -- Real-time Grasp Detection Using Efficient Channel Attention.
This book aims to examine innovation in the fields of computer engineering and networking. The text covers important developments in areas such as artificial intelligence, machine learning, information analysis, communication system, computer modeling, internet of things. This book presents papers from the 13th International Conference on Computer Engineering and Networks (CENet2023) held in Wuxi, China on November 3-5, 2023.
9789819992430
Telecommunication.
Computational intelligence.
Internet of things.
Computer Networks.
Communications Engineering, Networks.
Computational Intelligence.
Internet of Things.
Computer Networks.
TK5101-5105.9
621.382
Preconditioned USSOR Iterative Method for H-matrix Linear Systems -- Research on Airport Gate Allocation Problem based on NSGA-Ⅱ Algorithm -- IntentDetector: Research on Intent vulnerability mining technology based on Fuzzing technology -- A Method for Measuring the Heterogeneity of Mimicry Defense Executor Set -- A Review of Research on Instance Segmentation Based on Deep Learning -- An Event Relation Extraction Model for Database Alarm Based on Type-Guided Graph Attention Network and CNN -- Vector quantization improvement algorithm for controlling average distortion in the context of big data -- Double-blind Quantum Identity Authentication Protocol Based on Scalar Product Computation -- Chaotic System Image Encryption Algorithm Base RSA -- Real-time Grasp Detection Using Efficient Channel Attention.
This book aims to examine innovation in the fields of computer engineering and networking. The text covers important developments in areas such as artificial intelligence, machine learning, information analysis, communication system, computer modeling, internet of things. This book presents papers from the 13th International Conference on Computer Engineering and Networks (CENet2023) held in Wuxi, China on November 3-5, 2023.
9789819992430
Telecommunication.
Computational intelligence.
Internet of things.
Computer Networks.
Communications Engineering, Networks.
Computational Intelligence.
Internet of Things.
Computer Networks.
TK5101-5105.9
621.382