Smart computing and communication : 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings / Meikang Qiu (eds.)
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | |
Other title: | SmartCom 2019. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
2019.
|
Series: | Lecture notes in computer science ;
11910. LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI. |
Subjects: |
Table of Contents:
- Intro; Preface; Organization; Contents; A Survey of Deep Learning Applied to Story Generation; Abstract; 1 Introduction; 2 Story-Generating Probabilistic Models; 2.1 Theme-Oriented Models; 2.2 Storyline-Oriented Models; 2.3 Human-Machine Interaction-Oriented Models; 3 Comparison of Story-Generating Probabilistic Models; 4 Challenges and Future Directions; 5 Conclusion; Acknowledgment; References; A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates; Abstract; 1 Introduction; 2 Image Preprocessing Methods for Roll Wear Morphology.
- 2.1 Roll Wear Surface Morphology Images2.2 Image Preprocessing Methods; 3 SRWC Scheme: Smart Roll Wear Check Scheme; 3.1 Feature Extraction of Roll Wear Morphology Images; 3.2 Fractal Behavior; 4 Recognition Model Based on Neural Network; 5 Conclusion; References; An Improved Prediction Model for the Network Security Situation; Abstract; 1 Introduction; 2 Building a Predictive Model; 3 MapReduce Distributed Training; 4 SVM Classification; 5 SVM Parameter Selection; 6 Experimental Simulation and Results Analysis; 6.1 Experimental Data Set; 6.2 Model Validation Experiment.
- 6.3 Experimental Results and Analysis7 Conclusions; Acknowledgements; References; A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles; Abstract; 1 Introduction; 2 Quantified Accuracy Measurement Based Localization Algorithm
- QuAMeL; 2.1 Algorithm Overview; 2.2 Initial Status; 2.3 The Underwater Navigation Status; 2.4 Broadcast Coordinate and Accuracy Index Information; 2.5 Coordinate and Accuracy Index Update; 3 Features of the Algorithm; 3.1 The Updating Process of Coordinate and Accuracy Index; 4 Performance Evaluation; 4.1 Simulation Settings.
- 4.2 The Average Updating Times via GPS5 Conclusion; Acknowledgement; References; An Improved Assessment Method for the Network Security Risk; Abstract; 1 Introduction; 2 I-HMM Model Parameters; 2.1 Observed Sequence Acquisition; 2.2 Parameter Estimation Algorithm; 3 Calculation of Network Security Risk Value; 4 Experimental Results and Analysis; 4.1 Experimental Environment Construction; 4.2 Experimental Data Collection and Processing; 5 Conclusion; References; A High-Performance Storage System Based with Dual RAID Engine; Abstract; 1 Introduction; 2 DSH Implementation.
- 2.1 Software Algorithm Implementation2.2 DSH Communication Framework; 3 Experiment Analysis; 4 Future Work; References; An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors; 1 Instruction; 2 Related Work; 2.1 Universal Adversarial Perturbation; 2.2 Fast Feature Fool; 3 Threat Model; 4 Approaches; 4.1 Generation Process of Universal Perturbation; 4.2 Attack Against Object Detectors; 5 Evaluation; 5.1 Setup; 5.2 Success Rate; 6 Conclusions; References; A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle.