<p><span>This book gathers the proceedings of the 13th International Conference on Frontier Computing, held in Tokyo, on July 10â13, 2023, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes,
Frontier Computing on Industrial Applications Volume 4: Proceedings of Theory, Technologies and Applications (FC 2023) (Lecture Notes in Electrical Engineering, 1134)
â Scribed by Jason C. Hung (editor), Neil Yen (editor), Jia-Wei Chang (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 348
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book gathers the proceedings of the 13th International Conference on Frontier Computing, held in Tokyo, on July 10â13, 2023, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, Web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, Web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.
⌠Table of Contents
Contents
Case Study in Developing Extensible Virtual Assistant Using Genie Framework
1 Introduction
2 Proposed Virtual Assistant
2.1 Function Set of the Virtual Assistant
2.2 ThingTalk
2.3 Device for Taiwan Stock Market
3 Preliminary Experiment
3.1 Data Source
3.2 Backend Servers
3.3 Genie Server
3.4 Experiment
3.5 Experiment Results
3.6 Evaluation
4 Conclusions and Future Works
4.1 Future Works
References
LNMER-Net: A Metabolically Enhanced Lymph Node Metastasis Recognition Model Based on Lung Lymph Nodes and Microenvironment
1 Introduction
2 Recognition of Lung Lymph Node Metastasis
2.1 LNMER-Net
2.2 Multi-receptive Field-Based Feature Extraction and Feature Space Optimization Method (MRFO)
3 Results and Discussion
3.1 Dataset and Preprocessing
3.2 Experimental Details and Evaluation Metrics
3.3 Comparison with Other Methods
3.4 Ablation Experiments
4 Conclusion
References
Key Factors for Unsubscribing from YouTube Channels: A Study of YouTubers in Taiwan
1 Introduction
2 Relevant Research
3 Experiment Design
4 Experiment and Analysis
4.1 Basic Information
4.2 Channel Types and Behaviors
4.3 Unsubscribe Factors
4.4 Variance and Correlation Analysis
5 Conclusions and Discussion
References
Practical Research on AI Visual Focus Analysis in Online Teaching
1 Introduction
2 Literature Discussion
2.1 AÂ Subsection Sample
2.2 Eye Tracker
2.3 Investigating the Reading Process Using Eye-Tracking Technology
3 Research Methods
3.1 Research Participants
3.2 Research Tools
3.3 Defining the Area of Interest (AOI) in Images
4 Discussion and Suggestion
References
Design of a Fair Distributed Computing Platform Based on Distributed Ledger Technology and Performance Measurements
1 Introduction
2 Related Work
2.1 Performance Measurements for AI Applications
2.2 Public and Incorruptible Transaction Platform Using Distributed Ledger Technology (DLT)
3 Method
4 Results
References
A Study on the Design of Eye and Eyeball Method Based on MTCNN
1 Introduction
1.1 Webcam Eye Tracking
1.2 Limitations of Eye Trackers in Experiments
1.3 The Universality of Eye Trackers
2 Literature
2.1 Face Detection
2.2 Eye Tracker
3 Experimental
3.1 Experimental Framework
3.2 Face Detection
3.3 Face Distance
3.4 Eye and Eyeball
3.5 Eye Tracker Correction
3.6 Eye Mapping
4 Conclusions and Directions for Future Research
References
A Comparative Study of GPT-2 and GPT-2 Based On Enhanced Self-attention Mechanism
1 Introduction
1.1 Introduction to GPT-2
1.2 Research Objective and Motivation
2 Experimental Design and Evaluation Methods
2.1 Implementation Details of the Optimized Model
2.2 Evaluation Metrics and Experimental Setup
3 Experimental Results and Analysis
4 Conclusions and Future Work
4.1 Summary of Research Results
4.2 Future Work
References
Case Classification System Based on Taiwanese Civil Summary Court Cases
1 Introduction
2 Related Works
2.1 Legal Artificial Intelligence
2.2 Application of NLP in Taiwanese Court Judgments
3 Experimental
3.1 Dataset
3.2 Data Preprocessing
3.3 Word Segmentation
3.4 Filtering Non-Chinese Words and Removing Stop Words
3.5 Term Frequency-Inverse Document Frequency
3.6 TF-IDF+SVM
3.7 BERT
4 Conclusions and Future Directions
References
Innovative Interaction Mode in VR Games
1 Introduction
1.1 Background
2 Related Work
2.1 Background
2.2 Interaction Modes in VR Games
2.3 Impact of Innovative Interaction Modes on Player Engagement
3 Theoretical Framework
3.1 Presence and Immersion
3.2 Flow Theory
3.3 Cognitive and Emotional Engagement
4 Proposed Interaction Mode and Prototype System
4.1 Theoretical Framework
4.2 Prototype Implementation
5 Conclusion
References
A Study on the Integration of Worked Examples and Blended Learning in the Curriculum During the COVID-19 Epidemic
1 Introduction
2 Method and Material
2.1 The Technology Acceptance Model
2.2 Segmented Worked Example
2.3 Blended Learning
2.4 Questionnaire
3 Result and Discussion
3.1 Preliminary Analysis
3.2 Reliability Analysis
3.3 Analysis of Total Validity and Validity of Various Aspects
3.4 Independent Sample t-test
3.5 Analysis of Variance (ANOVA)
4 Conclusion
5 Limitations and Future Prospects
References
An Intelligent Thermal Compensation System Using Edge Computing for Machine Tools
1 Introduction
2 Related Research
2.1 Machine Tool Thermal Compensation
2.2 Time Series Model
2.3 Edge Computing for Smart Manufacturing
3 Research Architecture and Related Algorithms
3.1 Research Framework
3.2 Related Algorithms
4 Experiment Introduction
4.1 Dataset Introduction
5 Analysis of Experimental Results
5.1 Experiment 1 Results and Discussion
5.2 Experiment 2 Results and Discussion
6 Conclusion
References
Cluster-Based Blockchain Systems for Multi-access Edge Computing
1 Introduction
2 Spectral Graph Theory Concept for Cluster-Based Blockchain
3 Stochastic Block Model (SBM) and Cluster-Based Blockchain
4 Results and Discussion
5 Conclusion and Future Work
References
Scanning QR Codes for Object Detection Based on Yolo-V7 Algorithm and Deblurring Generative Adversarial Network
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Yolo-V7 Architecture
3.3 DeblurGAN-V2 Architecture
4 Experimental Results and Discussion
4.1 Experimental Setup
4.2 Parameters Settings and Evaluation Metrics
4.3 Compared Approaches
5 Conclusion
References
Positive-Unlabeled Learning with Field of View Consistency for Histology Image Segmentation
1 Introduction
2 Related Work
2.1 PU Learning
2.2 Consistency Regularization
3 Method
3.1 Review of PU Segmentation
3.2 Field of View Consistency
3.3 A Simple Two-Step Method
4 Experiment
4.1 Experimental Setup
4.2 Segmentation Performance
5 Conclusion
References
Cryptanalysis and Improvement to Two Key-Policy Attribute-Based Encryption Schemes for Weighted Threshold Gates
1 Introduction
1.1 Organization
2 Preliminaries
2.1 Notations
2.2 Bilinear Maps and Complexity Assumption
2.3 Access Structure
2.4 Lagrange Polynomial Interpolation
2.5 Key-Policy Attribute-Based Encryption for Weighted Threshold Gates
3 Review and Cryptanalysis on Gu and Lin's KP-ABE-WT Scheme
3.1 Review on GL22
3.2 Cryptanalysis on GL22
4 An Improved Scheme
5 Cryptanalysis on Lin et al.'s KP-ABE-WT Scheme
6 Conclusion
References
Applying Virtual Reality to Teaching the Law of Conservation of Energy in Physics
1 Literature Discussion
2 Methods and Steps
2.1 Energy Conservation LawâGravitational Potential Energy
2.2 Energy Conservation LawâElastic Potential Energy
3 Research Results
4 Conclusion
References
An Efficient Edge-Based Index for Processing Collective Spatial Keyword Query on Road Networks
1 Introduction
2 The Proposed Algorithms
2.1 Edge-Based Collective Nine-Area Tree
2.2 The Basic Expanding Algorithm
2.3 The Nearest Keyword First Exact Algorithm
3 Performance Evaluation
4 Conclusions
References
Multi-feature Data Generation for Design Technology Co-Optimization: A Study on WAT and CP
1 Introduction
2 Background
3 System Architecture
4 Experimental Results and Collaborative Optimization Platform
5 Conclusions
References
Joint Multi-view Feature Network for Automatic Diagnosis of Pneumonia with CT Images
1 Introduction
2 Related Work
3 Method
3.1 Data Collection and Processing
3.2 Model Architecture
3.3 The Person-Level Classifier
4 Experiment and Results
4.1 Implementation and Evaluation
4.2 Experiment Results and Analysis
4.3 Interpretability
5 Conclusion
References
Ensemble Deep Learning Techniques for Advancing Breast Cancer Detection and Diagnosis
1 Introduction
1.1 Related Works
2 Methodology
2.1 Dataset
2.2 Preprocessing
2.3 Deep Learning
2.4 Ensemble Learning
2.5 Evaluation
3 Results and Comparison
3.1 Results
4 Conclusion
5 Future Work
References
Enhanced Multipath QUIC Protocol with Lower Path Delay and Packet Loss Rate
1 Introduction
2 Related Work
3 Design of Path Selection Scheme
4 Performance Results
4.1 Experimental Setting
4.2 Flow Completion Time
4.3 Packet Loss Rate
4.4 Overall System Stability
5 Conclusion
References
Implementation of a Deep Learning-Based Application for Work-Related Musculoskeletal Disorders' Classification in Occupational Medicine
1 Introduction
2 The KIM-LHC Method
3 System Design and Implementation
3.1 System Design
3.2 System Implementation
4 Conclusion
References
Single-to-Multi Music Track Composition Using Interactive Chaotic Evolution
1 Introduction
2 Related Works
3 Method
3.1 Data Preparation
3.2 Model Architecture
3.3 Interactive Chaotic Evolution
4 Experiment and Evaluation
4.1 Dataset
4.2 Evaluation
5 Future Work
References
A Fairness-Aware Load Balancing Strategy in Multi-tenant Clouds
1 Introduction
2 Related Works
3 Fairness-Aware Load Balancing Strategy
4 Experiment Results
5 Conclusions
References
Comments on a Double-Blockchain Assisted Data Aggregation Scheme for Fog-Enabled Smart Grid
1 Introduction
2 Review of DA-SADA
2.1 System Initialization Phase
2.2 UA-Blockchain Generation Phase
2.3 FA-Blockchain Generation Phase
2.4 Service Supporting Phase
3 Security Analysis of DA-SADA
3.1 Failure to Ensure Anonymity
3.2 Disclosure of the Private Key
3.3 Generation of a Valid Signature of the Forged Dataâs Ciphertext
3.4 Failed Signature Verification
3.5 Inaccurate and Missing Statements
4 Conclusions
References
Pavement Distress Detection Using YOLO and Faster RCNN on Edge Devices
1 Introduction
2 System Design and Implementation
2.1 System Architecture
3 Type of Pavement Distress and Data Collection
3.1 Type of Road Damage
3.2 Data Collection
3.3 Data Augmentation
3.4 Feature Label and CSV File Generation
4 Pavement Distress Model Training Results
5 Web Page Presentation
References
The Application of Artificial Intelligence to Support Behavior Recognition by Zebrafish: A Study Based on Deep Learning Models
1 Introduction
1.1 Zebrafish Applied to Biomedicine
1.2 Deep Learning Applied to Zebrafish Research
1.3 Introduction to YOLOv7
2 Method
2.1 Data Collection and Processing
2.2 Model Training and Behavioral Judgment
2.3 Experimental Environment
2.4 Evaluation Indicators
3 Results
4 Conclusion
References
A Survey of Speech Recognition for People with Cerebral Palsy
1 Introduction
2 Related Works
3 Methodology
3.1 Metrics of Speech Recognition
3.2 Speech Recognition Performance of Google, Microsoft and YaTing
References
Fire and Smoke Detection Using YOLO Through Kafka
1 Introduction
2 Literature Review
2.1 Machine Learning
2.2 Image Recognition (Detection)
2.3 Kafka
2.4 YOLO Algorithm
3 Data Collection and Experimental Results
3.1 Training
3.2 Server Setup
3.3 Data Collection
3.4 Experimental Results
4 Conclusion and Future Works
References
mKIPS: A Lightweight Modular Kernel-Level Intrusion Detection and Prevention System
1 Introduction
2 Related Work
3 System Design and Implementation
3.1 System Overview
3.2 Lightweight Modular Architecture
3.3 Detection Module and Detection Rules
3.4 Response Module and Reaction Mechanisms
3.5 Receive Packet Steering (RPS) Enabling
4 Experimental Results
4.1 Experimental Environment
4.2 Experimental Results
5 Conclusions
References
SIAR: An Effective Model for Predicting Game Propagation
1 Introduction
2 Related Works
3 The SIR Model
4 Methods
4.1 SIAR Model
4.2 The Solution of SIAR Model
5 Experiment Results
5.1 Dataset
5.2 Experiment Implementation
5.3 Analysis
6 Conclusion
References
Symbolic Regression Using Genetic Programming with Chaotic Method-Based Probability Mappings
1 Introduction
2 Related Works
2.1 Genetic Programming
2.2 Chaos Theory for Optimization Algorithm
3 Different Probability Mapping for Operators are Used in Genetic Programming
3.1 Random Search-Based DPMOGP
3.2 Genetic Algorithm-Based DPMOGP
4 Experiments and Discussion
4.1 Dataset
4.2 Chaotic Mapping
4.3 Results and Discussion
5 Conclusion and Future Works
References
Exploring the Potential of Webcam-Based Eye-Tracking for Traditional Eye-Tracking Analysis
1 Introduction
2 Related Work
3 Design of the System
4 Conclusion
5 Future Work
References
New Group-Key-Based Over the Air (OTA) Update Model Facilitating Security and Efficiency Using MQTT 5
1 Introduction
2 Related Work
3 New MQTT-Group-Key-Based OTA Model
3.1 The Group-Key-Based OTA Model
3.2 The Detailed Design Using MQTT 5.0
4 Security Analysis and Performance Evaluation
4.1 Security Analysis
4.2 Performance Evaluation
5 Conclusions and Future Work
References
A Study on the Improvement of Navigation Accuracy with ArUco Markers
1 Introduction
2 Experimental Process
2.1 Movement to Destination Position Using SLAM
2.2 Camera Calibration
2.3 ArUko Marker Tracking and Position Calibration
3 Results and Conclusions
References
Big Data and Network Analysis in National Innovation Systems: The Roles of Academia, Industry, and Government Research Institutes and Their Interactions
1 Introduction
2 Data and Analytical Method
3 Results
3.1 Innovative Performance in the KNIS
3.2 Characteristics of the Joint Research Network
4 Conclusion
Reference
Author Index
đ SIMILAR VOLUMES
<p><span>This book gathers the proceedings of the 13th International Conference on Frontier Computing, held in Tokyo, on July 10â13, 2023, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes,
<p><span>This book gathers the proceedings of the 13th International Conference on Frontier Computing, held in Tokyo, on July 10â13, 2023, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes,
<p><span>This book gathers the proceedings of the 12th International Conference on Frontier Computing, held in Tokyo, Japan, on July 12â15, 2022, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad
<p><span>This book gathers the proceedings of the 9th International Conference on Frontier Computing, held in Kyushu, Japan on July 9â12, 2019, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad the