Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'16). Volume 2 (2016)
- Record Type:
- Book
- Title:
- Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'16). Volume 2 (2016)
- Main Title:
- Proceedings of the First International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'16).
- Other Titles:
- IITI 2016
- Further Information:
- Note: Ajith Abraham, Sergey Kovalev, Valery Tarassov, Václav Snášel, editors.
- Editors:
- Abraham, Ajith, 1968-
Kovalev, Sergey
Tarassov, Valery
Snášel, Václav, 1957- - Other Names:
- International Conference on Intelligence Information Technologies for Industry, 1st
- Contents:
- Preface; Organization; Conference Chairs; Conference Vice-Chair; International Program Committee; Organizing Committee Chair; Local Organizing Committee; Sponsoring Institutions; Contents; Part ICognitive Technologies on the Basisof Sensor and Neural Networks; 1 The Data Transfer Development in MANET Networks on the Base of Chinese Remainder Theorem; Abstract; 1 Introduction; 2 Mathematical Model of MANET Network; 3 The Method of Error Detection; 3.1 The Error Detection Method Based on the Chinese Remainder Theorem. 3.2 Modification of the Error Detection Method on the Basis of the Approximate Method4 The Effective Neural Network SSS Implementation; 4.1 Finite Ring Neural Network; 4.2 Modeling; 5 Conclusion; Acknowledgment; References; 2 Using of a Convolutional Neural Network with Changing Receptive Fields in the Tasks of Image Recognition; Abstract; 1 Introduction; 2 Mathematical Modeling of CNN with Extended Training Set; 3 Experimental Research of CNN Generalization Capability with Changing Receptive Fields; References. 3 Application CUDA for Optimization ANN in Forecasting Electricity on Industrial EnterpriseAbstract; 1 Introduction; 2 Description of the Neural Network Model; 2.1 Artificial Neural Network Model; 2.2 CUDA; 2.3 Learning Algorithm of Neural Network; 2.4 Modification of a Model; 3 Implementation of ANN in the Programming Language {\varvec C}\!{+\!+} ; 4 Experiments and Results; 4.1 Formalization of the Problem; 4.2 Experiments; 5 Conclusion; References;Preface; Organization; Conference Chairs; Conference Vice-Chair; International Program Committee; Organizing Committee Chair; Local Organizing Committee; Sponsoring Institutions; Contents; Part ICognitive Technologies on the Basisof Sensor and Neural Networks; 1 The Data Transfer Development in MANET Networks on the Base of Chinese Remainder Theorem; Abstract; 1 Introduction; 2 Mathematical Model of MANET Network; 3 The Method of Error Detection; 3.1 The Error Detection Method Based on the Chinese Remainder Theorem. 3.2 Modification of the Error Detection Method on the Basis of the Approximate Method4 The Effective Neural Network SSS Implementation; 4.1 Finite Ring Neural Network; 4.2 Modeling; 5 Conclusion; Acknowledgment; References; 2 Using of a Convolutional Neural Network with Changing Receptive Fields in the Tasks of Image Recognition; Abstract; 1 Introduction; 2 Mathematical Modeling of CNN with Extended Training Set; 3 Experimental Research of CNN Generalization Capability with Changing Receptive Fields; References. 3 Application CUDA for Optimization ANN in Forecasting Electricity on Industrial EnterpriseAbstract; 1 Introduction; 2 Description of the Neural Network Model; 2.1 Artificial Neural Network Model; 2.2 CUDA; 2.3 Learning Algorithm of Neural Network; 2.4 Modification of a Model; 3 Implementation of ANN in the Programming Language {\varvec C}\!{+\!+} ; 4 Experiments and Results; 4.1 Formalization of the Problem; 4.2 Experiments; 5 Conclusion; References; Part IIProbabilistic models, Algebraic BayesianNetworks and Information Protection. 4 Models and Algorithms for the Information System's Users' Protection Level Probabilistic EstimationAbstract; 1 Introduction; 2 Models' Description; 2.1 Model of the User of Information System and the Model of User's Vulnerabilities Profile; 2.2 Model of Malefactor; 2.3 Model of Hosts of Informational Systems and Computer Network; 2.4 Model of Critical Documents; 3 Conclusion; References; 5 An Adaptive Algorithm for the Steganographic Embedding Information into the Discrete Fourier Transform Phase Spectrum; Abstract; 1 Introduction; 2 The Suggested Algorithm of Data Embedding. 2.1 Review of the Methods to Build in the Information into Digital Images Utilizing Discrete Fourier Transform2.2 Investigation of the Discrete Fourier Transform Steganographic Properties; 2.3 The Suggested Algorithm of Embedding Data into Digital Images; 2.4 Experiments; 3 Conclusion; Acknowledgments; References; 6 Decremental and Incremental Reshaping of Algebraic Bayesian Networks Global Structures; Abstract; 1 Introduction; 2 Background; 2.1 Problem Statement; 2.2 Definitions and Notations; 3 Decremental Algorithm for Removing the Vertex; 3.1 Algorithm Description. … (more)
- Issue Display:
- Volume 2
- Volume:
- 2
- Issue Sort Value:
- 0000-0002-0000-0000
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xv, 504 pages), illustrations (some color)
- Subjects:
- 658.50028563
Engineering
Artificial intelligence -- Industrial applications -- Congresses
Data mining -- Congresses
Artificial intelligence -- Industrial applications
Data mining
BUSINESS & ECONOMICS / Industrial Management
BUSINESS & ECONOMICS / Management
BUSINESS & ECONOMICS / Management Science
BUSINESS & ECONOMICS / Organizational Behavior
Technology & Engineering -- Robotics
Computers -- Intelligence (AI) & Semantics
Robotics
Artificial intelligence
Artificial intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319338163
3319338161 - Related ISBNs:
- 9783319338156
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 20, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.355974
- Ingest File:
- 01_316.xml