No abstract available.
Proceeding Downloads
A Convolutional Neural Network Based on Self-Attention Mechanism for Molecular Property Prediction Using Molecular Hidden Fingerprints: An efficient molecular property prediction method
With the development of artificial intelligence, the project of using deep learning for molecular property prediction has gained much attention. The current widely used molecular description methods, such as Morgan molecular fingerprinting, need further ...
DeTable: Table data extraction model based on deep
The rapid development of the information age leads to the mass production and frequent transmission of data, which is difficult to deal with by human alone. With the rise and development of artificial intelligence, the use of data is becoming more ...
Co-attention Based Deep Model with Domain-Adversarial Training for Spam Review Detection
Douban has become one of the most popular Chinese film review platforms and has been attacked by various spammers. In our research based on real data from Douban, we found that many spammers spontaneously form different groups, which have different ...
Fair Personalized Recommendation through Improved Matrix Factorization by Neural Networks
Existing recommendation systems mainly focus on the improvement of accuracy but neglect to involve non-popular items, which leads to the unfairness problem of recommendation results. More specifically, the low exposure rate of non-popular items impairs ...
An Automated Approach to Domain-specific Term Extraction for Programming Language
Automatic Term Extraction is a common upstream task of both natural language and programming language processing tasks. However, most existing domain-specific term extraction methods are designed for natural language, and do not satisfy demand for ...
Application-based KNOWLEDGE CAPTURE amongst youth can be a reason for public concern. Evidence from the UK
This paper examines the knowledge capture, play liberation of application-based gambling amongst youth in the U.K. As a growing social phenomenon that is becoming an issue of concern because of the addictive effects on younger consumers, particularly ...
The Iot Malware Classification Method Based On Visual Local Features
This paper proposed a Internet of things (IoT) malware classification method, which uses a novel visual local feature based on sections of the malware binary. This method filter binary file section of malware samples, then divides the section contents ...
Calculation of Brain Cortical Complexity Based on T1-weighted Imaging by Edge Fitting
The complexity of human cerebral cortex has important clinical value for the prediction, diagnosis and prevention of certain diseases. In this paper, we mainly used edge extraction and curve fitting to assess the cortical complexity by calculating the ...
Fingerprint Feature Extraction Method of Specific Emitter Based on Correlation of IQ Signal
The I/Q imbalance of modulator model leads to individual differences in gain and phase mismatch. In this paper, a new method of specific emitter identification is proposed based on these differences. In the method, I/Q signals is decomposed by I/Q ...
Brain MR image registration based on an Improved CNN Model
Brain image registration is a key part of brain image processing, so the research of brain image registration technology has important value. This paper proposes a brain MR image registration algorithm based on an improved convolutional neural network (...
Image segmentation technique based on boundary gray threshold algorithm
Chromosome karyotype analysis is an important technique in cytogenetics and plays an important role in modern medical system. Chromosome karyotype analysis is to observe the physical images of chromosomes under a microscope with a high-definition camera,...
A FCN-based signal extraction for spectrum sensing with considering simultaneously parameters estimation
In this paper, An end-to-end, pixels-to-pixels deep learning method of signal extraction and parameters estimation for spectrum sensing was developed. A novel spectrum density map was designed for counting signal number at each time, computing signal-to-...
Cooperative Spectrum Handoff based on Counterfactual Multi-agent Method
Cognitive radio networks (CRNs) improve spectrum resource utilization rate by providing dynamic spectrum access for second users (SUs) when the spectrum is used by primary users (PUs). When multiple SUs exist in a CRN at the same time, spectrum handoff ...
Radar Target Tracking Algorithm Based On New Particle Swarm Optimization Particle Filter
The particle filter based on particle swarm optimization algorithm has low precision and is easy to fall into local optimization, which is difficult to meet the needs of target tracking. In this paper, a new particle swarm optimization particle filter ...
Accurate Multicarrier Waveform Classification Using Convolutional Neural Networks
To improve spectrum utilization efficiency and flexibility in diverse application scenarios, several new multicarrier modulation techniques have been proposed in recent years, and thus accurate recognition of various multicarrier waveforms is critical ...
Spectrum Handoff Based on Bilateral Auction Mechanism in Centralized Cognitive Radio Networks
With the exponential explosion of radio services, spectrum scarcity has become a thorny issue in wireless communications. Cognitive radio networks (CRNs) emerge as the times require. However, choosing the best channel for spectrum handoff becomes a ...
Universal Interactive Verification Framework for Federated Learning Protocol
Federated learning protocol provides an applicable solution for large-scale deep learning in distributed scenario. However, existing federated learning system is vulnerable to many attacks and threats. This paper proposes a universal verification ...
An Adaptive Swarm Intelligence-Based Task Scheduling Framework for Heterogeneous IoT Systems
Task scheduling is one of the most fundamental technologies in a cloud computing environment. The essence of resource scheduling is to determine the appropriate executor and provide the on-demand resources to meet the task overhead. Due to the ...
All Pairs Routing Path Enumeration using Latin Multiplication and Julia
Enumerating all routing paths among Autonomous Systems (ASes) at an Internet-scale is an intractable problem. The Border Gateway Protocol (BGP) is the standard exterior gateway protocol through which ASes exchange reachability information. Building an ...
Simulation Study of Routing Mechanism in the Computing-aware Network
Traditional routing algorithms select the path based on the cost, hop, or other network-related metrics. However, with cloud computing and edge computing development, it is essential to develop a computing-aware routing mechanism to distribute the task ...
An Energy Efficiency Evaluation Scheme of IPHC over CSMA and TSCH in 6LoWPAN Networks
Many studies have focused on the impact of Media Access Control (MAC) layer protocols on wireless sensor networks (WSN). In realistic Internet of Things (IoT) scenarios, multiple protocols are used to ensure the efficient operation of the network. IP ...
Research on Multi-station Integrated 5G Communication Scheme for Smart Energy Station
Smart energy station is a new generation of energy hub infrastructure based on substation, which realizes the multi-station functions of substation, energy storage station, photovoltaic station, charging station and data center station. To improve the ...
Index Terms
- Proceedings of the 2021 10th International Conference on Networks, Communication and Computing