Browse Results

Showing 53,201 through 53,225 of 53,743 results

5G for Future Wireless Networks: First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #211)

by Haijun Zhang Zhiyong Feng Victor C.M. Leung Yonghui Li Keping Long Zhongshan Zhang

This book constitutes the proceedings of the First International Conference on 5G for Future Wireless Networks, 5GWN 2017, held in Beijing, China, in April 2017. The 64 full papers were selected from 135 submissions and present the state of the art and practical applications of 5G technologies. The exponentially growing data traffic caused by the development of mobile Internet and smart phones requires powerful networks. The fifth generation (5G) techniques are promising to meet the requirements of this explosive data traffic in future mobile communications.

International Conference on Neural Computing for Advanced Applications: 4th International Conference, NCAA 2023, Hefei, China, July 7–9, 2023, Proceedings, Part II (Communications in Computer and Information Science #1870)

by Haijun Zhang Yinggen Ke Zhou Wu Tianyong Hao Zhao Zhang Weizhi Meng Yuanyuan Mu

The two-volume set CCIS 1869 and 1870 constitutes the refereed proceedings of the 4th International Conference on Neural Computing for Advanced Applications, NCAA 2023, held in Hefei, China, in July 2023.The 83 full papers and 1 short paper presented in these proceedings were carefully reviewed and selected from 211 submissions. The papers have been organized in the following topical sections: Neural network (NN) theory, NN-based control systems, neuro-system integration and engineering applications; Machine learning and deep learning for data mining and data-driven applications; Computational intelligence, nature-inspired optimizers, and their engineering applications; Deep learning-driven pattern recognition, computer vision and its industrial applications; Natural language processing, knowledge graphs, recommender systems, and their applications; Neural computing-based fault diagnosis and forecasting, prognostic management, and cyber-physical system security; Sequence learning for spreading dynamics, forecasting, and intelligent techniques against epidemic spreading (2); Applications of Data Mining, Machine Learning and Neural Computing in Language Studies; Computational intelligent Fault Diagnosis and Fault-Tolerant Control, and Their Engineering Applications; and Other Neural computing-related topics.

International Conference on Neural Computing for Advanced Applications: 4th International Conference, NCAA 2023, Hefei, China, July 7–9, 2023, Proceedings, Part I (Communications in Computer and Information Science #1869)

by Haijun Zhang Yinggen Ke Zhou Wu Tianyong Hao Zhao Zhang Weizhi Meng Yuanyuan Mu

The two-volume set CCIS 1869 and 1870 constitutes the refereed proceedings of the 4th International Conference on Neural Computing for Advanced Applications, NCAA 2023, held in Hefei, China, in July 2023.The 83 full papers and 1 short paper presented in these proceedings were carefully reviewed and selected from 211 submissions. The papers have been organized in the following topical sections: Neural network (NN) theory, NN-based control systems, neuro-system integration and engineering applications; Machine learning and deep learning for data mining and data-driven applications; Computational intelligence, nature-inspired optimizers, and their engineering applications; Deep learning-driven pattern recognition, computer vision and its industrial applications; Natural language processing, knowledge graphs, recommender systems, and their applications; Neural computing-based fault diagnosis and forecasting, prognostic management, and cyber-physical system security; Sequence learning for spreading dynamics, forecasting, and intelligent techniques against epidemic spreading (2); Applications of Data Mining, Machine Learning and Neural Computing in Language Studies; Computational intelligent Fault Diagnosis and Fault-Tolerant Control, and Their Engineering Applications; and Other Neural computing-related topics.

Neural Computing for Advanced Applications: Second International Conference, NCAA 2021, Guangzhou, China, August 27-30, 2021, Proceedings (Communications in Computer and Information Science #1449)

by Haijun Zhang Zhi Yang Zhao Zhang Zhou Wu Tianyong Hao

This book presents refereed proceedings of the Second International Conference Neural Computing for Advanced Applications, NCAA 2021, held in Guangzhou, China, in August, 2021. The 54 full papers papers were thorougly reviewed and selected from a total of 144 qualified submissions. The papers are organized in topical sections on neural network theory, cognitive sciences, neuro-system hardware implementations, and NN-based engineering applications; machine learning, data mining, data security and privacy protection, and data-driven applications; neural computing-based fault diagnosis, fault forecasting, prognostic management, and system modeling; computational intelligence, nature-inspired optimizers, and their engineering applications; fuzzy logic, neuro-fuzzy systems, decision making, and their applications in management sciences; control systems, network synchronization, system integration, and industrial artificial intelligence; computer vision, image processing, and their industrial applications; cloud/edge/fog computing, the Internet of Things/Vehicles(IoT/IoV), and their system optimization; spreading dynamics, forecasting, and other intelligent techniques against coronavirus disease (COVID-19).

Neural Computing for Advanced Applications: First International Conference, NCAA 2020, Shenzhen, China, July 3–5, 2020, Proceedings (Communications in Computer and Information Science #1265)

by Haijun Zhang Zhao Zhang Tianyong Hao Zhou Wu

This book presents refereed proceedings of the First International Conference Neural Computing for Advanced Applications, NCAA 2020, held in July, 2020. Due to the COVID-19 pandemic the conference was held online. The 36 full papers and 7 short papers were thorougly reviewed and selected from a total of 113 qualified submissions. Thes papers present resent research on such topics as neural network theory, and cognitive sciences, machine learning, data mining, data security & privacy protection, and data-driven applications, computational intelligence, nature-inspired optimizers, and their engineering applications, cloud/edge/fog computing, the Internet of Things/Vehicles (IoT/IoV), and their system optimization, control systems, network synchronization, system integration, and industrial artificial intelligence, fuzzy logic, neuro-fuzzy systems, decision making, and their applications in management sciences, computer vision, image processing, and their industrial applications, and natural language processing, machine translation, knowledge graphs, and their applications.

The Authoritative Guide on Harbor: Management and Practice of Cloud Native Artifacts Such as Container Images and Helm Charts

by Haining Zhang Yan Wang

Harbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.

Digital Transformation: 16th Workshop On E-business, Web 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers (Lecture Notes in Business Information Processing #328)

by Han Zhang Byungjoon Yoo Michael J. Shaw Ming Fan Wooje Cho

This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2017 theme was “Digital transformation: challenges and opportunities”. The 11 papers presented in this volume were carefully reviewed and selected from 43 submissions. These are original research articles with a broad coverage of behavioral issues on consumers, citizens, businesses, industries and governments, ranging from technical to strategic issues.

Distributed Hash Table

by Hao Zhang Yonggang Wen Haiyong Xie Nenghai Yu

This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and communication. These platforms and applications are used in both academic and commercials fields, making Distributed Hash Table a valuable resource for researchers and industry professionals.

Smart Collaborative Identifier Network

by Hongke Zhang Wei Su Wei Quan

This book introduces a promising design for future Internet, the Smart Collaborative Identifier NETwork (SINET). By examining cutting-edge research from around the world, it is the first book to provide a comprehensive survey of SINET, including its basic theories and principles, a broad range of architectures, protocols, standards, and future research directions. For further investigation, the book also provides readers an experimental analysis of SINET to promote further, independent research. The second part of the book presents in detail key technologies in SINET such as scalable routing, efficient mapping systems, mobility management and security issues. In turn, the last part presents various implementations of SINET, assessing its merits. The authors believe SINET will greatly benefit researchers involved in designing future Internet thanks to its high degree of flexibility, security, manageability, mobility support and efficient resource utilization.

Reconfigurable Intelligent Surface-Empowered 6G (Wireless Networks)

by Hongliang Zhang Boya Di Lingyang Song Zhu Han

This book presents novel RIS-Based Smart Radio techniques, targeting at achieving high-quality channel links in cellular communications via design and optimization of the RIS construction. Unlike traditional antenna arrays, three unique characteristics of the RIS will be revealed in this book. First, the built-in programmable configuration of the RIS enables analog beamforming inherently without extra hardware or signal processing. Second, the incident signals can be controlled to partly reflect and partly transmit through the RIS simultaneously, adding more flexibility to signal transmission. Third, the RIS has no digital processing capability to actively send signals nor any radio frequency (RF) components. As such, it is necessary to develop novel channel estimation and communication protocols, design joint digital and RIS-based analog beamforming schemes and perform interference control via mixed reflection and transmission. This book also investigates how to integrate the RIS to legacy communication systems. RIS techniques are further investigated in this book (benefited from its ability to actively shape the propagation environment) to achieve two types of wireless applications, i.e., RF sensing and localization. The influence of the sensing objectives on the wireless signal propagation can be potentially recognized by the receivers, which are then utilized to identify the objectives in RF sensing. Unlike traditional sensing techniques, RIS-aided sensing can actively customize the wireless channels and generate a favorable massive number of independent paths interacting with the sensing objectives. It is desirable to design RIS-based sensing algorithms, and optimize RIS configurations. For the second application, i.e., RIS aided localization, an RIS is deployed between the access point (AP) and users. The AP can then analyze reflected signals from users via different RIS configurations to obtain accurate locations of users. However, this is a challenging task due to the dynamic user topology, as well as the mutual influence between multiple users and the RIS. Therefore, the operations of the RIS, the AP, and multiple users need to be carefully coordinated. A new RIS-based localization protocol for device cooperation and an RIS configuration optimization algorithm are also required. This book targets researchers and graduate-level students focusing on communications and networks. Signal processing engineers, computer and information scientists, applied mathematicians and statisticians, who work in RIS research and development will also find this book useful.

Unmanned Aerial Vehicle Applications over Cellular Networks for 5G and Beyond (Wireless Networks)

by Hongliang Zhang Lingyang Song Zhu Han

This book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications.Second type of application is to exploit UAVs for sensing purposes, such as smart agriculture, security monitoring, and traffic surveillance. Due to the limited computation capability of UAVs, the real-time sensory data needs to be transmitted to the BS for real-time data processing. The cellular networks are necessarily committed to support the data transmission for UAVs, which the authors refer to as Cellular assisted UAV Sensing. To support real-time sensing streaming, the authors design joint sensing and communication protocols, develop novel beamforming and estimation algorithms, and study efficient distributed resource optimization methods.This book targets signal processing engineers, computer and information scientists, applied mathematicians and statisticians, as well as systems engineers to carve out the role that analytical and experimental engineering has to play in UAV research and development. Undergraduate students, industry managers, government research agency workers and general readers interested in the fields of communications and networks will also want to read this book.

Trusted Computing and Information Security: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Communications in Computer and Information Science #960)

by Huanguo Zhang Bo Zhao Fei Yan

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018.The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Emerging Technologies for Education: 6th International Symposium, SETE 2021, Zhuhai, China, November 11–12, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13089)

by Hui Zhang Weijia Jia Tianyong Hao Yong Tang Raymond S. T. Lee Michael Herzog Tian Wang

This book constitutes the refereed conference proceedings of the 6th International Symposium on Emerging Technologies for Education, SETE 2021, held in Zhuhai, China in November 2021. 35 full papers were accepted together with 8 short papers out of 58 submissions. The papers focus on the following subjects: Emerging Technologies for Education, Digital Technology, Creativity, and Education; Education Technology (Edtech) and ICT for Education; Education + AI; Adaptive Learning, Emotion and Behaviour Recognition and Understanding in Education; as well as papers from the International Symposium on User Modeling and Language Learning (UMLL2021) and the International Workshop on Educational Technology for Language Learning (ETLL 2021).

Tableau 10.0 Best Practices

by Jenny Zhang

Develop a deep understanding of Tableau 10.0 and get to know tricks to understand your data About This Book • Quickly learn tips, tricks, and best practices about Tableau from Tableau masters • Whether it is data blending or complex calculations, you can solve your problem with ease and confidence; no more searching for a help doc or waiting for support • If you want to quickly master Tableau, then this book is for you Who This Book Is For This book is for Tableau users who have a basic to average understanding of the various features available in Tableau. You'll find this book useful if you spend a lot of time conducting data analysis and visualizations with Tableau. What You Will Learn • Connect to variety of data (cloud and local) and blend it in an efficient way for fast analytics • Advanced calculations such as LOD calculations and Table calculations • See advanced use cases of Parameter, Sorting, and Filters • Get practical tips on how to format dashboards following the Zen of dashboard design • See examples of a variety of visualizations such as cohort analysis, Jitters chart, and multiple small charts • See the new features in Tableau 10—cross data source filter, worksheet as tooltip, cluster, and custom territory In Detail Tableau has emerged as an industry leader in the field of data discovery and business analytic software solutions. While there is a lot of information on how to use the tool, most Tableau users are faced with the challenge on how it can be effectively used to derive meaningful business insights from the uncharted territory of data. This book will give you useful tips from Tableau masters learned from years of experience working with Tableau. You'll start by getting your data into Tableau, move on to generating progressively complex visualizations, and end with finishing touches and packaging your work for distribution. Inside you will learn the exact steps required to solve complex real-life problems. Whether it is data blending or complex calculations, you can solve your problem with ease and confidence; no more searching for Help doc or waiting for support. This book will help you make the most of Tableau and become a Tableau expert. Style and approach The book will show you hacks to solve complex real-life problems. This book will help you make the most of Tableau and become a Tableau expert. This book is packed with lots of real-life problems with step-by-step instructions from Tableau experts.

Automatic Generation of Combinatorial Test Data (SpringerBriefs in Computer Science)

by Jian Zhang Zhiqiang Zhang Feifei Ma

This book reviews the state-of-the-art in combinatorial testing, with particular emphasis on the automatic generation of test data. It describes the most commonly used approaches in this area - including algebraic construction, greedy methods, evolutionary computation, constraint solving and optimization - and explains major algorithms with examples. In addition, the book lists a number of test generation tools, as well as benchmarks and applications. Addressing a multidisciplinary topic, it will be of particular interest to researchers and professionals in the areas of software testing, combinatorics, constraint solving and evolutionary computation.

Lattice-Based Cryptosystems: A Design Perspective

by Jiang Zhang Zhenfeng Zhang

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.

Innovation of Digital Economy: Cases from China (Management for Professionals)

by Jianlin Zhang Kezhen Ying Kanliang Wang Zhigang Fan Ziyi Zhao

This book presents a rich selection of 36 real-world cases on how organizations in China explore the new growth pattern, business model innovation, and digital transformation in digital era. The topic of cases varies from digital marketing and Internet brands, the growth of digital platforms, digital transformation and the industrial Internet of things, strategies for cross-border e-commerce companies, and business model innovation in digital era, etc. These cases stem from a diverse set of industry sectors, reporting on best practices and lessons learned. The book shows how organizations strive to find new ways to develop and create new paths to grow in a digital world and shares essential practical insights into digital economy. All cases are presented in a standardized structure in order to provide valuable insights and essential guidance for practitioners, scholars as well as general readers.

Visual Saliency: From Pixel-Level to Object-Level Analysis

by Jianming Zhang Filip Malmberg Stan Sclaroff

This book will provide an introduction to recent advances in theory, algorithms and application of Boolean map distance for image processing. Applications include modeling what humans find salient or prominent in an image, and then using this for guiding smart image cropping, selective image filtering, image segmentation, image matting, etc. In this book, the authors present methods for both traditional and emerging saliency computation tasks, ranging from classical low-level tasks like pixel-level saliency detection to object-level tasks such as subitizing and salient object detection. For low-level tasks, the authors focus on pixel-level image processing approaches based on efficient distance transform. For object-level tasks, the authors propose data-driven methods using deep convolutional neural networks. The book includes both empirical and theoretical studies, together with implementation details of the proposed methods. Below are the key features for different types of readers.

Broad Learning Through Fusions: An Application on Social Networks

by Jiawei Zhang Philip S. Yu

This book offers a clear and comprehensive introduction to broad learning, one of the novel learning problems studied in data mining and machine learning. Broad learning aims at fusing multiple large-scale information sources of diverse varieties together, and carrying out synergistic data mining tasks across these fused sources in one unified analytic. This book takes online social networks as an application example to introduce the latest alignment and knowledge discovery algorithms. Besides the overview of broad learning, machine learning and social network basics, specific topics covered in this book include network alignment, link prediction, community detection, information diffusion, viral marketing, and network embedding.

Geotechnical Reliability Analysis: Theories, Methods and Algorithms

by Jie Zhang Te Xiao Jian Ji Peng Zeng Zijun Cao

This textbook systematically introduces the theories, methods, and algorithms for geotechnical reliability analysis. There are a lot of illustrative examples in the textbook such that readers can easily grasp the concepts and theories related to geotechnical reliability analysis. A unique feature of the textbook is that computer codes are also provided through carefully designed examples such that the methods and the algorithms described in the textbook can be easily understood. In addition, the computer codes are flexible and can be conveniently extended to analyze different types of realistic problems with little additional efforts.

ICT in Education in Global Context

by Jinbao Zhang Junfeng Yang Maiga Chang Tingwen Chang

Intended to promote the innovative use of technology in education and promote educational advances all over the world, this volume brings together 16 best-practice cases on technology-enhanced educational innovations. Experts from Turkey, Tunisia, Cyprus, Italy, Malaysia, China, India and Finland have contributed to these cases, highlighting the current state-of-the-art in the use of technology in education in their respective counties. Topics include best practices for designing smart classrooms, effective use of tablets and interactive whiteboards, virtual learning environments, digital learning spaces, game-based learning, synchronous cyber classrooms, micro-courses, among others. The book offers an essential resource on emerging technologies and the educational approaches currently being pursued in different countries to foster effective learning.

Technology, Research and Professional Learning: Constructing Intellectual Exchange in the Rise of Network Society (Perspectives on Rethinking and Reforming Education)

by Jingjing Zhang

This book investigates the use of network technologies in research, and explores how such use potentially changes the nature of professional learning between academics. It attempts to situate the discussion of technology use in real-world research settings, to identify the different forms of participation in intellectual exchange embedded in academic dialogue, and to further contribute to knowledge on how the use of network technology potentially changes the nature of learning. Multiple data collection methods are employed, in two forms of study: a single case study, and a number of individual interviews. The single case study was carried out over a one-year period, and consisted of interviews (22 interviewees), observations, and document review. Individual semi-structured interviews were carried out over a similar period of time with a wider and different population of 24 academics from different Oxford faculties. Half of these were interviewed twice.The main findings presented in this book demonstrate that the direct consequences of technology use are changes to academic dialogue and scholarly communication in general. The change to this critical aspect of research – scholarly communication – has potentially led to more distributed research in interconnected research environments. It is the changes to scholarly communication and the research environment that consequently affect participation in intellectual exchange.

Media Access Control and Resource Allocation

by Jingjing Zhang Nirwan Ansari

This book focuses on various Passive optical networks (PONs) types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems

by Jinhui Zhang Yuanqing Xia Zhongqi Sun Duanduan Chen

The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.

LISS2019: Proceedings of the 9th International Conference on Logistics, Informatics and Service Sciences

by Juliang Zhang Martin Dresner Runtong Zhang Guowei Hua Xiaopu Shang

This book focuses on AI and data-driven technical and management innovations in logistics, informatics and services. The respective papers analyze in detail the latest fundamental advances in the state of the art and practice of logistics, informatics, service operations and service science. The book gathers the outcomes of the “9th International Conference on Logistics, Informatics and Service Sciences,” which was held at the University of Maryland, USA.

Refine Search

Showing 53,201 through 53,225 of 53,743 results