<p><p>This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12<sup>th</sup> International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter
Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the 16th International Conference on IIHMSP in conjunction ... (Smart Innovation, Systems and Technologies)
✍ Scribed by Jeng-Shyang Pan (editor), Jianpo Li (editor), Oyun-Erdene Namsrai (editor), Zhenyu Meng (editor), Miloš Savić (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 552
- Edition
- 1st ed. 2021
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book presents selected papers from the Sixteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the Thirteenth International Conference on Frontiers of Information Technology, Applications and Tools, held on November 5–7, 2020, in Ho Chi Minh City, Vietnam. It is divided into two volumes and discusses the latest research outcomes in the field of Information Technology (IT) including information hiding, multimedia signal processing, big data, data mining, bioinformatics, database, industrial and Internet of things, and their applications.
✦ Table of Contents
Conference Organization
Conference Founders
Honorary Chairs
Advisory Committee
General Chairs
Program Chairs
Publication Chairs
Special Session Chairs
Special Track Co-chairs
Electronic Media Chairs
Finance Chairs
Local Organization Chairs
Program Committee
Committee Secretaries
Preface
Contents
About the Editors
Modeling and Simulation for Battery Energy Storage System Participating in Power System Frequency Modulation Based on Power System Analysis Software Package
1 Introduction
2 Battery Energy Storage System Model
2.1 Mathematical Model of BESS
2.2 PSASP Model of Energy Storage System
3 Example Analysis
3.1 Model Validity Verification
3.2 Simulation of Power System Frequency Modulation Based on Energy Storage Model
4 Conclusion
References
CNN Character Recognition Model for 3D Integral Image Character
1 Introduction
2 Method and Dataset
2.1 Fonts and Characters Collection
2.2 Generate Elemental Images
2.3 Generate Integral Images
3 Result
3.1 Training Result
3.2 Evaluation Result
4 Conclusion
References
Using Virtual Machines in Computer Networking Class
1 Introduction
2 Research Methodology
2.1 Network Laboratory Design
2.2 An Implemented Laboratory Design
2.3 Virtual Machine
2.4 Virtualization
2.5 A Full Virtualization
2.6 Para-Virtualization
2.7 OS-Layer Virtualization
2.8 Virtual Network Infrastructure
3 Experimental Result
3.1 Classroom Environment
3.2 Computer Used in Laboratory Work
3.3 Software Used in Laboratory Work
3.4 Laboratory Practice 1
3.5 Laboratory Practice 2
3.6 Laboratory Practice 3
3.7 Result
4 Conclusion
References
Usability Evaluation of Mobile Luxury Brand Websites Based on the Analytic Hierarchy Process
1 Introduction
2 Related Work
2.1 Research on Usability Evaluation
2.2 Analytic Hierarchy Process
2.3 Research Model of Usability Evaluation
3 Experiment Design
3.1 Experimental Subject
3.2 Experimental Methods
4 Results and Discussion
5 Conclusion
References
Study of Low-Cost-Based Smart Home Control Using IoT Powered by Photovoltaic Cells
1 Introduction
2 Proposed Smart Home System
2.1 Photovoltaic Cell Design
2.2 Servomotor Design
2.3 Microcontroller Design
2.4 Relay Design
2.5 Battery Design
2.6 Load Design
3 Efficiency of Photovoltaic Cell
3.1 Microcontroller (ESP-8266) Setting
3.2 Relay Setting
3.3 Control Setting
3.4 System Test Results and Analysis
4 Conclusion
References
Design of Combined Cycle Gas Turbine and IoT in Production Electricity from KIVU Lake Methane Gas
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusion and Suggestion
References
An Implementation of Ionic-Based Hybrid Mobile Application for Controlling Bluetooth Low-Energy-Based Humidifier Device
1 Introduction
2 Methods
2.1 Bluetooth Low Energy
2.2 Ionic Framework
3 Proposed Solution
4 Implementation
5 Conclusion
References
Study of Assessing the Stability of Rwanda’s Power System from Big Data Based on Power Generation
1 Introduction
2 Methodology
3 Current Situation of Rwanda Power System Sector
4 Expected Future Status of Rwanda Power System Sector
5 Rwanda General Energy Source Sector
6 Rwanda Power Blackout Experience
7 Discussion and Recommendations
8 Conclusion
References
Image Feature Detection and Clustering for UAV Multiple Obstacles Avoidance
1 Introduction
2 Related Works
3 Method
4 Experimental Results
5 Conclusion
References
Sentiment Analysis for Mongolian Tweets with RNN
1 Introduction
2 Related Work
3 Methodology
3.1 Deep Learning
3.2 Multilayer Perceptron
3.3 Recurrent Neural Network
3.4 Word Embedding
3.5 Preprocessing
4 Experiments and Results
4.1 Environment Setup
4.2 Model Implementation
4.3 Experiments and Results
5 Conclusion
References
Thin Point Light Source Display
1 Introduction
2 Conventional Point Light Source Display
2.1 Point Light Source Display
2.2 Calculation to Create an Elemental Image of the PLS Display
2.3 The Viewing Angle and Resolution of a Conventional PLS Display
3 Proposed Method
3.1 The Proposed Method of PLS Display
3.2 Calculation to Create an Elemental Image of the Proposed PLS Display
3.3 The Viewing Angle and Resolution of the Proposed PLS Display
4 Experimental Result
4.1 Experimental Result of Parallel Ray and PLSs
4.2 Experimental Result of Conventional PLS Display
4.3 Experimental Result of the Proposed Thin PLS Display
5 Conclusion
References
Dynamic Token Distribution Model for Privacy Protection of Mobile Users
1 Introduction
2 The Principle of Token-D Model
2.1 Privacy Protection
2.2 Token-D Model Architecture
3 Token Distribution Process
3.1 Synchronous Update
3.2 Validation Mechanism and Contingency Plan
3.3 Three-Party Interaction Mode
4 Evaluation Analysis
5 Conclusion
References
Cascading Fault Prevention of Power Grid Based on Key Power Generation Nodes
1 Introduction
2 The Safety Level Index of Power Grid Cascading Trip
3 Solution Process of the Model
4 Example Analysis
5 Conclusion
References
Optimal Power Generation Output Considering Cascading Failure
1 Introduction
2 Severity Evaluation Index of Interlocking Disturbed Branch
3 Optimization Model Solution Based on PSO
4 Example Analysis
5 Conclusions
References
A Survey of Common IOT Communication Protocols and IOT Smart-X Applications of 5G Cellular
1 Introduction
2 Internet of Things Communication Protocols
2.1 Bluetooth LE
2.2 Zigbee
2.3 Z-Wave
2.4 Wi-Fi
3 5G Cellular
4 Near-Field Communication (NFC)
5 LoRaWAN
6 IOT-X Applications
6.1 Smart Cities
6.2 Smart Energy and The Smart Grid
6.3 Smart Home, Smart Buildings, and Infrastructure
6.4 Smart Industrial Manufacturing
6.5 Smart Health
6.6 Smart Farming
7 Discussion
8 Conclusion
References
Study of Thermal Power Plant’s Intelligent Fire Detection and Suppression System Via Wireless Sensor Network and Carbon Capture and Storage Technology
1 Introduction
2 Proposed Fire Alarm System Design
3 Experimental Design and Verification
3.1 Wireless Sensor Network
3.2 Manual Initiating Device
3.3 Technology of Carbon Storage and Capture
3.4 Codes, Standards, and Regulations of Fire
4 Result Analysis and Discussion
5 Conclusion and Suggestion
References
Game-Theoretic Decision-Making Analysis on Antivirus
1 Introduction
2 Literature Review
3 Game Theory and Mixed Strategy Nash Equilibrium
4 Antivirus Report with Performance Test
4.1 Game-Theoretic Model and Analysis
5 Results and Conclusion
References
A New JPEG Encryption Scheme Using Adaptive Block Size
1 Introduction
2 Proposed Scheme
2.1 Transformation Stage Encryption
2.2 Block Permutation
2.3 Entropy Coding Stage Encryption
3 Experimental Result and Analysis
3.1 Perceptual Security
3.2 Brute-Force Attack
3.3 Key Sensitivity Analysis
3.4 Statistical Attack
3.5 Compression Performance
4 Conclusion
References
Study of Smart Decorating Machine on Cake Patten
1 Introduction
2 System Hardware and Software Design
2.1 Linkage Mechanism
2.2 G-Code Introduction and Analysis
2.3 Linear Interpolation Algorithm
2.4 System Main Program
3 System Integration and Testing
3.1 Accuracy Test of Three-Axis Linkage Device
3.2 Discharge Device Status Test
3.3 Decorating Function Test
3.4 Data Analysis and Discussion
4 Conclusion and Suggestion
References
Study of Advanced Low-Cost Smart Prepaid Electricity Meter Using Arduino and GSM
1 Introduction
2 Literature Reviews
3 Proposed System
4 Hardware Implementation
4.1 Controller of Arduino UNO
4.2 Module of GSM
4.3 Relay Module
4.4 Energy Meter
5 Working System and Experimental Results
6 Conclusion
References
Study of Integrating the Data Fusion Method for Reducing and Preventing Road Accidents Occur at Blackspots Places in Third World Countries
1 Introduction
2 Problem Description
3 Methodology
3.1 Filter of Kalman
3.2 Data Fusion Flow Chart and Government Intervention
4 Simulation and Discussion
5 Conclusion
References
Study of 2D SubMarine Tracking with Complete Worked Out Example Based on Kalman Filter
1 Introduction
2 Methodology
3 Complete Example Worked Out
3.1 Predicted State
3.2 The Initial Covariance Matrix
3.3 The Covariance Matrix of Predicted Process
3.4 Calculating the Kalman Gain
3.5 The New Observation
3.6 Calculating the Current State
3.7 Update the Covariance Matrix with the Overlapping Process for the Next Stage
4 Results and Discussions
5 Study Conclusion
References
Retina Macular Edema and Age-Related Macular Degeneration Feature Recognition Method Based on the OCT Images
1 Introduction
2 Data Preprocessing
3 Convolutional Neural Networks and Occlusion Sensitivity
3.1 Overview
3.2 OCC-DME Algorithm Process
4 Experimental Results and Discussion
4.1 Dataset
4.2 OCC-DME and SVM Algorithm Accuracy Comparison
4.3 Discussion
5 Conclusion
References
Gene Expression PPI Network Clustering Analysis Between Endometrial Cancer and Ovarian Cancer
1 Introduction
2 Gene Data Clustering Analysis
2.1 Motivation
2.2 Preprocessing
3 PPI Network Analysis
3.1 Homologous and Heterogeneous Genes PPI Network
3.2 Dedicated Ovarian Cancer Gene Analysis
4 Evaluation Analysis
5 Conclusion
References
Automatic Identification and Classification Method for Diabetic Retinopathy FFA Image Processing
1 Introduction
2 DR Classification Method
3 SADRD Algorithm
3.1 Preprocessing
3.2 Standard Vectors
3.3 Multi-class Support Vector Machine
3.4 Algorithm Description
4 Evaluation
5 Conclusion
References
Emotional Expression Analysis Based on Fine-Grained Emotion Quantification Model Via Social Media
1 Introduction
2 Motivation
3 Fine-Grained Emotion Quantification Model
3.1 Preprocessing
3.2 Quantification of Emotional Expression
3.3 Emotional Expression Analysis Algorithm
4 Experiment and Results
5 Conclusion
References
Fuzhou PM2.5 Prediction and Related Factors Analysis
1 Introduction
2 Materials and Methods
2.1 Study Sites
2.2 LSTM
2.3 PCC
3 Results and Discussions
4 Conclusion
References
An Improved Whale Optimization Algorithm and Its Application to Power Generation in Cascade Reservoir
1 Introduction
2 Reservoir Optimal Operation Model
2.1 Power Generation Formula
2.2 Restrictions
3 Adaptive Perturbation Whale Optimization Algorithm
3.1 Nonlinear Time-Varying Adaptive Weights
3.2 Differential Variation Perturbation Factor
3.3 Improved Spiral Update Method
3.4 APWOA Algorithm Flow
4 Experimental Results
4.1 Test on Standard Function
4.2 Test on Reservoir Power Generation
5 Conclusions
References
Prediction of Hypertension Using Deep Autoencoder-Based Feature Representation
1 Introduction
2 Materials and Method
2.1 Data
2.2 Method
3 Experiment
4 Results
5 Conclusion
References
The Prediction Model for High-Risk Patient with Liver Cancer Based on Classification Approaches
1 Introduction
2 Related Works
3 Methods and Experimental Results
3.1 Classification Methods
3.2 Performance Evaluation Methods
3.3 Experimental Results
4 Conclusion
References
Improve the Fingerprinting Algorithm Based on Affinity Propagation Clustering to Increase the Accuracy and Speed of Indoor Positioning Systems
1 Background
2 Related Works
3 Algorithms Using Affinity Propagation Clustering Method
3.1 Clustering to Improve Speed
3.2 Clustering to Improve Quality
3.3 Test Scenarios
4 Results and Evaluation
5 Conclude
Reference
Avoid Selection Bias in Observational Study Based on Health Big Data
1 Introduction
1.1 Epidemiology Study
1.2 Selection Bias
2 Prevention Methods
2.1 Systematic Prevention
2.2 Matching Method
2.3 Propensity Score
3 Conclusion
References
Caffeine Drinks and the Risk of Cancer: A Review
1 Introduction
2 Caffeine Drinks and the Risk of Cancer
2.1 Breast Cancer
2.2 Colorectal Cancer
2.3 Head and Neck Cancer
2.4 Liver Cancer
2.5 Ovarian Cancer
2.6 Prostate Cancer
3 Conclusion
References
Association Rule Mining Method to Predict Coronary Artery Disease: KNHANES 2016–2018
1 Introduction
2 Materials and Methods
2.1 Data Preprocessing
2.2 Feature Selection
2.3 Association Rule Mining
3 Experiments and Results
3.1 Data
3.2 Variable Selection Result
3.3 Discovered Association Rule
4 Conclusion
References
Framework Design of Anti-online Learning Anomie Behavior System
1 Introduction
2 Design Steps and Principles
3 System Design
3.1 Information Collection During Registration
3.2 Supervision and Intervention During Learning Process
3.3 Monitoring During Examination
4 Experiment
4.1 Design of the Information Feedback Function
4.2 Issues and Adjustment
5 Application Prospects and Future Work
References
Research on Intelligent Scene Generation Based on Unity3D
1 Introduction
2 Related Work
2.1 Design Composition of Scene Intelligent Generation
2.2 Access to Needed Material from Public Resource Sharing Platforms Such as Asset Store
3 Introduction of Key Algorithms
3.1 Material Object Generation
3.2 Use of Arrays to Determine the Reasonableness of Objects
3.3 Example Objects Using Array Elements
4 Experimental Results
4.1 Scene Generation Process
5 Summary and Prospect
5.1 Summary
5.2 Outlook
References
A Study of Guide Interpretation of Haihunhou Pavilion in Nanchang in the Age of Artificial Intelligence
1 Artificial Intelligence and Machine Translation
1.1 Artificial Intelligence
1.2 Machine Translation
1.3 Translation Machine
2 Guide Interpretation and Machine Interpretation
2.1 Guide Interpretation
2.2 Studies on Machine Interpretation
3 Guide Interpretation of Haihunhou Pavilion in Nanchang
3.1 The Site of Haihunhou
3.2 Guide Interpretation of Haihunhou Pavilion in Nanchang
4 Conclusion
References
Detection Method for Crowd Abnormal Behavior Based on Long Short-Term Memory Network
1 Introduction
2 Methodology
2.1 Improved ViBe Foreground Extraction Algorithm
2.2 Focal Loss Function Optimization LSTM Algorithm
3 Experiment
3.1 Analysis of Results
4 Conclusion
References
Research of Software Testing Technology Based on Statechart Diagram
1 Introduction
2 The Test Based on Statechart Diagram
2.1 Extended Finite State Machine
2.2 UML Statechart
2.3 Test Coverage Criteria
2.4 Minimum Test Cases
2.5 Test Case Generation Strategy
3 Case Analysis
3.1 Statechart Diagram Modeling
3.2 Building EFSM
3.3 To Generate Test Tree and Test Path
3.4 Generate Minimal Test Path Set
3.5 Generate Test Cases
4 Conclusion
References
Research on Intelligent Optimization Method of Grid Communication Server Based on Support Vector Machine
1 Introduction
2 Thread Pool Tuning Model Based on Support Vector Machine
2.1 Thread Pool Performance Model
2.2 Thread Pool Tuning Model Based on Support Vector Machine
3 Support Vector Machine Model Based on Improved Fluid Search Optimization Algorithm
4 Experimental Results
4.1 Experimental Data and Environment
4.2 SVM Training Results with Improved Fluid Search Optimization
4.3 Server Performance Test Experiment
5 Conclusion
References
Research on Optimization Model for Thread Pool Performance on Grid Information Server
1 Introduction
2 Thread Pool Performance Analysis
3 Modeling Thread Pool Performance
4 Thread Pool Performance Experiment
4.1 Throughput Affects Thread Pool Performance
4.2 Task Operation Time Affects Thread Pool Performance
4.3 Task Wait Time Affects Thread Pool Performance
5 Conclusion
References
Network Security Situation Assessment of Power Information System Based on Improved Artificial Bee Colony Algorithm
1 Introduction
2 Design of Network Security Situation Assessment Model Based on Neural Network
3 Network Security Situation Assessment Method Based on Improved Artificial Bee Colony Algorithm
4 Experimental Results
4.1 Setting up the Experimental Environment
4.2 Analysis of Experimental Results
5 Conclusion
References
A Brief Survey on Recent Advances of Object Detection with Deep Learning
1 Introduction
2 Detection Frameworks
2.1 Two-Stage Detection Frameworks
2.2 One-Stage Detection Frameworks
3 Object Detection Challenges and Solutions
4 Object Detection Data Set, Metrics, and Applications
4.1 Object Detection Data Set
4.2 Metrics
4.3 Applications
5 Conclusion and Future Directions
References
Research on the Method of Neural Network Switchgear Portrait Based on Sequence Clustering
1 Introduction
2 Data Acquisition and Pretreatment
2.1 Data Collection and Serialization
2.2 Time Tagging of Signal Sequence
3 Switchgear Portrait Based on Aggregation Technology
3.1 Algorithm Steps
3.2 Construction of Switchgear Portrait Model
3.3 Verification of the Switchgear Portrait Algorithm
4 Experimental Results and Conclusion
4.1 Experimental Results
4.2 Conclusion
References
Detection of False Data Injection Attack in Power Grid Based on Machine Learning
1 Introduction
2 Feature Extraction of Attack Detection Data
2.1 Outlier Score Extraction Based on Isolation Forest
2.2 Feature Extraction Method of Iforest-LLE Measurement Data
3 Attack Detection Model Based on GBDT
4 Simulation Experiment and Example Analysis
4.1 Experiment Preparation
4.2 The Construction of False Data Injection Attack Vector
4.3 Experimental Results and Analysis
5 Conclusion
References
Demand Response Strategy Model Based on User Satisfaction
1 Introduction
2 Intelligent Family Microgrid Load Analysis
2.1 Load Model
2.2 Load Characteristic Constraints
3 A Demand Response Strategy for Household Microgrid
3.1 The Key Technology of Demand Response Strategy Model
3.2 Bacterial Colony Chemotaxis Hybrid Algorithm
4 Instance Validations
4.1 User’s Satisfaction Verification
4.2 Algorithm Verification
4.3 Verification of Demand Response Model
5 Conclusion
References
Low-Complexity MMSE Precoding Based on SSOR Iteration for Large-Scale Massive MIMO Systems
1 Introduction
2 System Model of Massive MIMO
3 MMSE Precoding Algorithm Based on SSOR Iteration
3.1 Classical MMSE Precoding
3.2 SSOR-based Precoding Algorithm
3.3 Relaxation Parameter
3.4 Complexity Analysis
4 Simulation Results
5 Conclusion
References
Design of Intelligent Substation Communication Network Security Audit System
1 Introduction
2 IEC61850
2.1 Substation Event Message GOOSE
2.2 Sample Value Message SV
2.3 Manufacturing Message Specification MMS
2.4 Summary of Intelligent Substation Communication Security Threats
3 Security Audit System Design
3.1 Overall Architecture Design
3.2 Data Communication Engine
3.3 Decoding Engine
3.4 Abnormal Detection
4 Conclusion
References
Research on Security Auditing Scheme of Intelligent Substation Communication Network
1 Introduction
2 Introduction to Traditional Security Audit Program
3 IEC61850
4 Research Program
4.1 SCD File Parsing
4.2 Network Traffic Analysis
4.3 Security Baseline Establishment
4.4 Threat Analysis Alarm
5 Conclusion
References
Design of Radio Frequency Energy Harvesting System
1 Introduction
2 Design of RFEH System
2.1 Harvesting Antenna Design
2.2 Matching Circuit
2.3 Design of Rectifier Booster Circuit
3 Experimental Results and Analysis
4 Conclusion
References
An Encryption Method of Power Cloud Data Based on n-RSA
1 Introduction
2 Power Cloud Security Technology
3 RSA Encryption Algorithm Introduction
4 n-RSA Encryption Algorithm Introduction
4.1 Prime Selection
4.2 Key Generation
5 Security Proof of n-RSA Algorithm in Power Cloud
6 Conclusion
References
K-Means-Based Method for Identifying Characteristics of Wireless Terminal Equipment in Power System
1 Introduction
2 Characteristic Behavior Recognition of Wireless Terminal Equipment in Power System
2.1 Basic Principles of Characteristic Behavior Recognition
2.2 The Overall Process of Characteristic Behavior Recognition
2.3 Basic Principles of Improved K-Means Algorithm
3 Experimental Simulation and Analysis
4 Conclusion
References
Security Transmission Technology of WSN Based on Trust Management Mechanism in Power System
1 Introduction
2 WSN Security Technology
2.1 Cryptography
2.2 Key Management
2.3 Secure Routing
3 Trust Management Mechanism
4 Trust Management Mechanism Based on Residual Energy
5 System Simulation Analysis
6 Conclusion
References
Survey of Attack Detection and Defense Technologies in Wireless Sensor Networks
1 Introduction
2 Wireless Sensor Networks Attack Methods and Their Detection and Defense Technologies
2.1 Camouflaged WSN Attacks
2.2 Non-camouflaged Attacks
3 Problems and Prospects
4 Conclusion
References
A Wireless Hijack Attack on Power Consumption System of Power Metering Automation
1 Introduction
2 Introduction of Power Consumption Side of Power Metering Automation
2.1 Operation Mechanism of Power Side System of Metering Automation System
2.2 Power Side System Protocol of Power Metering Automation
3 Safety Analysis of Power Consumption Side of Metering Automation System
3.1 No Encrypted Transmission and Simple Verification Mechanism
3.2 One-Way Identity Authentication Mechanism
3.3 One-Way Authentication of GSM Network
4 Wireless Hijacking Attack Experiment of Power Side System of Measurement Automation
4.1 Experimental Environment
4.2 Experiment Process
5 Experimental Results
6 Conclusion
References
Research on Real-Time Deformation Measurement of Structural Frame Based on Data Driven
1 Introduction
2 Deformation Measurement of Structural Frame
3 Algorithm for Deformation of Structure Frame
3.1 Data-Driven Methods
3.2 kNN for Deformation of Structural Frame
4 Example
5 Experiment
6 Conclusion
References
A Sensor Fusion Method for In-Station Articulation of Train
1 Introduction
2 Related Work
3 Sensors Calibration
3.1 Camera Calibration
3.2 Joint Calibration
4 Radar Signal Processing
4.1 Signal Preprocessing
4.2 Signal Modification Based on Improved Kalman Filter
5 Over-All Experiment
6 Conclusion and Outlook
References
Intelligent Fault Diagnosis Using Limited Data Under Different Working Conditions Based on SEflow Model and Data Augmentation
1 Introduction
2 Theoretical Background
2.1 Normalizing Flow
2.2 Squeeze-and-excitation Networks (SEnets)
3 Design of Proposed Model and System Framework
3.1 Model Training of Proposed Frame
4 Experiments Analysis
4.1 Introduction of Datasets and Compared Augmentation Method
4.2 Compared Augmentation Techniques
4.3 Results on CWRU Dataset
5 Conclusions
References
The Unified Framework of Deep Multiple Kernel Learning for Small Sample Sizes of Training Samples
1 Introduction
2 Proposed Depth-Width-Scaling Deep Kernel Learning Network
2.1 Framework
2.2 Algorithm
3 Experiments
4 Conclusion
References
Quasiconformal Mahalanobis Distance-Based Kernel Mapping Machine Learning for Hyperspectral Data Classification
1 Introduction
2 Proposed Algorithm
3 Experiments and Analysis
4 Conclusion
References
Research on Time-Delay Estimation of PMSM Driving System Based on RLS Method
1 Introduction
2 PMSM Driving System Model with Time-Delay Factor
3 Time Delay Parameter Estimate
3.1 Principle of Recursive Least Square (RLS) Method
3.2 Time Delay Parameter Estimation
4 Simulation Verification and Analysis
5 Conclusion
References
Cache Learning Method for Terrific Detection of Atrial Fibrillation
1 Introduction
2 Related Work
3 Cache Learning Method
3.1 Preliminary Learning
3.2 Screening
3.3 Development
3.4 Elimination
4 Experimental Work
5 Conclusion
References
Enhanced the Depth of Integral Image Display by Using Barrier Array
1 Introduction
2 Depth Range of InIm Display
3 Proposed Method
4 Experimental Results
4.1 Effect of Barrier on the Depth
4.2 Enhanced the Depth Range of the 3-D Display by Using Barrier Array
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<p><p>This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12<sup>th</sup> International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter
This volume includes papers presented at IIH-MSP 2017, the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, held on 12–15 August 2017 in Matsue, Shimane, Japan. The conference covered topics ranging from information hiding and security, and multimedia
This volume includes papers presented at IIH-MSP 2017, the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, held from 12 to 15 August 2017 in Matsue, Shimane, Japan. The conference addresses topics ranging from information hiding and security, and mul
<p><p>This book features papers presented at IIH-MSP 2018, the 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The scope of IIH-MSP included information hiding and security, multimedia signal processing and networking, and bio-inspired multimedia tec
<p><p>This book features papers presented at IIH-MSP 2018, the 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The scope of IIH-MSP included information hiding and security, multimedia signal processing and networking, and bio-inspired multimedia tec