Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'16). Volume 2 / Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav Snášel, editors.
Annotation
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , , |
Other title: | IITI 2016. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Switzerland :
Springer,
2016.
|
Series: | Advances in intelligent systems and computing ;
451. |
Subjects: |
Table of Contents:
- Preface; Organization; Conference Chairs; Conference Vice-Chair; International Program Committee; Organizing Committee Chair; Local Organizing Committee; Sponsoring Institutions; Contents; Part ICognitive Technologies on the Basisof Sensor and Neural Networks; 1 The Data Transfer Development in MANET Networks on the Base of Chinese Remainder Theorem; Abstract; 1 Introduction; 2 Mathematical Model of MANET Network; 3 The Method of Error Detection; 3.1 The Error Detection Method Based on the Chinese Remainder Theorem.
- 3.2 Modification of the Error Detection Method on the Basis of the Approximate Method4 The Effective Neural Network SSS Implementation; 4.1 Finite Ring Neural Network; 4.2 Modeling; 5 Conclusion; Acknowledgment; References; 2 Using of a Convolutional Neural Network with Changing Receptive Fields in the Tasks of Image Recognition; Abstract; 1 Introduction; 2 Mathematical Modeling of CNN with Extended Training Set; 3 Experimental Research of CNN Generalization Capability with Changing Receptive Fields; References.
- 3 Application CUDA for Optimization ANN in Forecasting Electricity on Industrial EnterpriseAbstract; 1 Introduction; 2 Description of the Neural Network Model; 2.1 Artificial Neural Network Model; 2.2 CUDA; 2.3 Learning Algorithm of Neural Network; 2.4 Modification of a Model; 3 Implementation of ANN in the Programming Language {\varvec C}\!{+\!+} ; 4 Experiments and Results; 4.1 Formalization of the Problem; 4.2 Experiments; 5 Conclusion; References; Part IIProbabilistic models, Algebraic BayesianNetworks and Information Protection.
- 4 Models and Algorithms for the Information System's Users' Protection Level Probabilistic EstimationAbstract; 1 Introduction; 2 Models' Description; 2.1 Model of the User of Information System and the Model of User's Vulnerabilities Profile; 2.2 Model of Malefactor; 2.3 Model of Hosts of Informational Systems and Computer Network; 2.4 Model of Critical Documents; 3 Conclusion; References; 5 An Adaptive Algorithm for the Steganographic Embedding Information into the Discrete Fourier Transform Phase Spectrum; Abstract; 1 Introduction; 2 The Suggested Algorithm of Data Embedding.
- 2.1 Review of the Methods to Build in the Information into Digital Images Utilizing Discrete Fourier Transform2.2 Investigation of the Discrete Fourier Transform Steganographic Properties; 2.3 The Suggested Algorithm of Embedding Data into Digital Images; 2.4 Experiments; 3 Conclusion; Acknowledgments; References; 6 Decremental and Incremental Reshaping of Algebraic Bayesian Networks Global Structures; Abstract; 1 Introduction; 2 Background; 2.1 Problem Statement; 2.2 Definitions and Notations; 3 Decremental Algorithm for Removing the Vertex; 3.1 Algorithm Description.