You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book brings together papers presented at the 2017 International Conference on Communications, Signal Processing, and Systems (ICCSP 2017), which was held on July 14–17, 2017 in Harbin, China. Presenting the latest developments and discussing the interactions and links between these multidisciplinary fields, the book spans topics ranging from communications, signal processing and systems. It is aimed at undergraduate and graduate electrical engineering, computer science and mathematics students, researchers and engineers from academia and industry as well as government employees.
Proceedings of the Sixth International Conference on Intelligent System and Knowledge Engineering presents selected papers from the conference ISKE 2011, held December 15-17 in Shanghai, China. This proceedings doesn’t only examine original research and approaches in the broad areas of intelligent systems and knowledge engineering, but also present new methodologies and practices in intelligent computing paradigms. The book introduces the current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, information retrieval, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, natural-la...
Proceedings of the Sixth International Conference on Intelligent System and Knowledge Engineering presents selected papers from the conference ISKE 2011, held December 15-17 in Shanghai, China. This proceedings doesn’t only examine original research and approaches in the broad areas of intelligent systems and knowledge engineering, but also present new methodologies and practices in intelligent computing paradigms. The book introduces the current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, information retrieval, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, natural-la...
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
This book constitutes the thoroughly refereed post-conference proceedings of theInternational Conference for Smart Health, ICSH 2016, held in Haikou, Hainan, China, in December 2016. The 23 full papers presented were carefully reviewed and selected from 52 submissions.They are organized around the following topics: big data and smart health; health data analysis and management; healthcare intelligent systems and clinical practice; medical monitoring and information extraction; clinical and medical data mining.
As the second volume of a two-volume set that studies the ancient Chinese academy from a socio-cultural perspective, this title investigates the multifaceted roles and political and cultural significance of the academy. Inaugurated in the Tang dynasty and eventually abolished in the late Qing dynasty, the academy, as a unique cultural and educational organization in the Chinese history, exerted extensive and profound influence on the ancient Chinese culture, politics, and social life. This title first discusses the state control of the academy and how it functions in social governance, then examines the sacrificial ritual of the academy and its influence on education, enculturation, Confucian orthodoxy, and intellectual ethos, and finally elaborates on the academy's role in enriching the regional cultures in terms of local cultural undertakings and talent cultivation. The title will be a useful reference for scholars, students, and general readers interested in cultural history, intellectual history, and educational history of ancient China and especially the Chinese academy culture.
This book constitutes the proceedings of the 17th International Conference on Web Information Systems and Applications, WISA 2020, held in Guangzhou, China, in September 2020. The 42 full papers and 16 short papers presented were carefully reviewed and selected from 165 submissions. The papers are grouped in topical sections on world wide web, recommendation, query processing and algorithm, natural language processing, machine learning, graph query, edge computing and data mining, data privacy and security, and blockchain.
This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics
This book constitutes the refereed proceedings of the 8th International Symposium on Parallel Architecture, Algorithm and Programming, PAAP 2017, held in Haikou, China, in June 2017. The 50 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 192 submissions. The papers deal with research results and development activities in all aspects of parallel architectures, algorithms and programming techniques.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.