The volume contains papers presented at International Conference on Intelligent Computing and its Emerging Applications (ICEA2021) which were held from December 28 to 29, 2021, in Jinan, Shandong Province, China. This conference is hosted by Qilu University of Technology (Shandong Academy of Sciences), Shandong Normal University, National & Local Joint Engineering Research Center of NSDP, Shandong Institute of Bigdata, China InfoCom Media Group, Chinese Journal of Network and Information Security, China, and BK21 Convergence Engineering for Intelligent Drone, Sejong University, Republic of Korea.
Security Use-Cases for Countering Threats of CLA and UAV in 6G
Recently1, 6G mobile communication technology has been actively researched and faces issues about security and privacy. The various technologies and applications to be used in 6G will bring new security issues. Among the technologies, CLA and UAV have a ...
Motion Feature Extraction and Stylization for Character Animation using Hilbert-Huang Transform
This paper presents novel insights to feature extraction and stylization of character motion in the instantaneous frequency domain by proposing a method using the Hilbert-Huang transform (HHT). HHT decomposes human motion capture data in the frequency ...
An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft Detection
Compared to traditional power grid systems, smart grid is capable of precisely and instantly detecting the segments of power grid breakdown, isolating the affected parts and segments, and rerouting transmission paths to unaffected segments to further ...
Multi-Agent Reinforcement Learning based on Two-Step Neighborhood Experience for Traffic Light Control
Several recent studies pointed out that an effective traffic signal/light control strategy will be able to mitigate the traffic congestion problem, and therefore variants of solutions have been presented for solving this optimization problem. The multi-...
CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture
Growing 5G1 applications require a user plane that has a high forward throughput and low packets loss. To meet these requirements, 5G acceleration means emerge, and User Plane Function (UPF) even more. The state of the art UPF acceleration is divided to ...
An Effective Neural Architecture Optimization Algorithm for CNN based on Search Economics
Developing a good convolutional neural network (CNN) architecture manually by trial and error is typically extremely time-consuming and requires a lot of effort. That is why several recent studies have attempted to develop ways to automatically ...
Visible Watermark Removal Based on Dual-input Network
A visible watermark removal network that combines partial and standard convolution is proposed in this paper. Existing deep learning-based watermark removal methods use a standard convolutional network over the watermarked image, using convolutional ...
A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETs
With the advance in the internet of things (IoT), wireless communication, and artificial intelligence, nowadays, people can enjoy the autonomous driving system. Meanwhile, security issues found in vehicular ad-hoc networks (VANETs) have attracted the ...
Search Economics for Multi-Objective Vehicle Routing Problem with Time Windows
Developing an effective search algorithm to find out a good solution for the vehicle routing problem is an importance issue, for a powerful search strategy can also be used to make a better decision for complex problems in the real life. The multi-...
A Training-free Genetic Neural Architecture Search
The so-called neural architecture search (NAS) provides an alternative way to construct a "good neural architecture," which would normally outperform hand-made architectures, for solving complex problems without domain knowledge. However, a critical ...
Listening to the Crowd for the Change File Localization of Mobile Apps
In order to allow developers to implement operable code-level modification tasks based on user feedback directly, so as to achieve rapid and continuous app updates and releases. We propose an efficient automated approach named LCFCR, which leverages ...
A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoT
At present, using a large number of unsafe IoT devices to form botnets and launching DDoS attacks have become one of the main threats to IoT security. However, most of the existing DDoS attack defense methods are limited to being implemented within a ...
Real-Time Prediction of Ocean Observation Data Based on Transformer Model
Ocean monitoring depends on the widely deployed oceanographic buoys and observation stations that integrate various types of ocean sensors. Those ocean sensors often work in harsh environments, so the data collected by the sensors are sometimes abnormal,...
A Scheme of Traceless File Deletion for Windows FAT32 File System
FAT32 file system is a common file system, especially in the USB devices, with good stability and compatibility. When the FAT file system, as an important carrier of data storage, is attacked, data in the file system can be easily stolen by an ...
Darknet Public Hazard Entity Recognition Based on Deep Learning
Due to the strong protection of anonymity, Darknet has been exploited by criminals to distribute harmful content and banned items, such as drugs, weapons, and malware, which are regarded as public hazard entities. The task of public hazard entity ...
In-network Computing based Transmission Optimization Mechanism in SDN
With the emergence of massive smart terminal devices, the network carries an explosive growth of data traffic. At the same time, the emerging real-time services have a high demand for network transmission delay. The contradiction between the limited ...
An Abused Webpage Detection Method Based on Screenshots Text Recognition
With the rapid development of the Internet, webpages containing abused information such as pornography and gambling have emerged in an endless stream. These webpages are using various methods to evade traditional detection methods and which seriously ...
Research on pork price prediction based on multi-dimensional feature analysis and machine learning
According to the situation of pork price fluctuation in Shandong province in recent years, this paper collects relevant data for comprehensive analysis and research. In the analysis, the pork price fluctuation is taken as the breakthrough point, and the ...
Development of Adaptive Soft-Sensors Based on Kalman-Elman Neural Network with Applications in Wastewater Treatment
Soft-sensors are usually used for difficult-to-measure variables prediction in wastewater treatment. Nowadays, neural networks, especially the dynamic neural networks, are widely used to predict and monitor these variables. However, traditional training ...
Heterogeneous multi-core optimization of MUMPS solver and its application
With the development of electromagnetic simulation technology and the increasing demand for simulation, simulation verification based on numerical simulation has received extensive attention from various research fields at home and abroad. Solving the ...
Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative Computing
As a new computing paradigm, Cloud-Edge collaborative computing has injected new vitality into edge computing. To make full use of the resources of Cloud Computing Server and Edge Computing Servers in the Cloud-Edge environment, and solve the problem of ...
Deep Text Matching in Medical Question Answering System
The retrieval question-answering(Q&A) system based on Q&A library is a system that can retrieve the most similar question from Q&A library to get the correct answer. Classic approaches only use TF-IDF, BM25 and other algorithms to calculate the shallow ...
Blockchain-based Certificateless Identity Management Mechanism in Cloud-native Environments
With the widespread development of cloud-native technologies, the security of cloud-native system has gradually attracted attention. Cloud-native uses PKI (Public Key Infrastructure) to provide an important guarantee for cloud-native network security, ...
swMETIS: A high performance graph partitioning library on Sunway manycore architecture
The graph structure and graph partitioning algorithms are widely used in many fields of scientific computing and artificial intelligence. With the development of big data, the magnitude of graph is increasing rapidly, which makes high performance graph ...
An automatic many-core code generation method and its implementation under Sunway environment
The parallel programming model of Sunway supercomputer based on accelerated thread library plays an important role on the acceleration performance of master-slave core parallelism. At present, two thread-based programming libraries, OpenACC and Athread, ...
Blockchain-Based Statistical Library for Telecom Security Fraud Cases
As Internet technology develops at a fast pace, telecom fraud cases happen more frequently, resulting in more and more people suffering great losses. This phenomenon should be kept under control, or it would bring bigger hazards to our society. However, ...
Intelligent Detection of Marine Organisms with Deep Learning based on Attention Mechanism
With the increasing intensity of marine fishing, the living space of marine organisms has become more and more serious. The establishment of marine pastures effectively solved the decrease in the number of fish caused by marine fishing. How to analyze ...
ECNN: One Online Deep Learning Model for Streaming Ocean Data Prediction
Despite been extensively explored, current techniques in sequential data modeling and prediction are generally designed for solving regression tasks in a batch learning setting, making them not only computationally inefficient but also poorly scalable ...
A Fast Light Baking System for Mobile VR Game Based on Edge Computing Framework
Metaverse development has often focused on bettering virtual reality technologies due to benefits in establishing immersion in virtual environment1. Its dependency on VR technology brings limitations including the lack of high-quality graphics and a ...
Prediction of Biochemical Oxygen Demand Based on VIP-PSO-Elman Model in Wastewater Treatment
Biochemical oxygen demand (BOD) is one of the principal indicators to evaluate wastewater effluent qualities. Establishing an effective prediction model is one of important way to monitor sewage water quality properly. However, due to the nonlinearity, ...
Cited By
-
Wu D, Han L, Luo Y, Guo H, Rashid T and Yue Y (2024). Implementation and optimization of multifrontal method for FT-M6678 Fourth International Conference on Digital Signal and Computer Communications (DSCC 2024), 10.1117/12.3033355, 9781510681538, (66)
-
Richey B, Grecos C, Shirvaikar M, Kehtarnavaz N and Shirvaikar M (2024). Multi-reward optimization using genetic algorithms for edge AI Real-Time Image Processing and Deep Learning 2024, 10.1117/12.3013331, 9781510673861, (3)