Frontier computing : theory, technologies and applications (FC 2018) /: theory, technologies and applications (FC 2018). (2018)
- Record Type:
- Book
- Title:
- Frontier computing : theory, technologies and applications (FC 2018) /: theory, technologies and applications (FC 2018). (2018)
- Main Title:
- Frontier computing : theory, technologies and applications (FC 2018)
- Further Information:
- Note: Editors, Jason C. Hung, Neil Y. Yen, Kuan-Ching Li.
- Editors:
- Hung, Jason C, 1973-
Yen, Neil Y
Kuai, Lin - Other Names:
- International Conference on Frontier Computing, 7th
- Contents:
- Intro; Contents; Research on Application's Credibility Test Method and Calculation Method Based on Application Behavior Declaration; Abstract; 1 Introduction; 2 Design of Credibility Verification Method; 2.1 Definition of ABD; 2.2 Application Implement Verification Module; 2.3 Tracking Module Records Actions of Application; 2.4 Verify Program Analysis Tracking Information; 3 Credibility Verification; 3.1 Standard of Credibility Verification; 3.2 Recessive Parameter Model and Calculation; 3.3 Credibility Judgment of Similar Behavior; 4 Conclusion; References The Selection of DNA Aptamers Against the Fc Region of Human IgGAbstract; 1 Introduction; 2 Materials and Methods; 2.1 Materials and Reagents; 2.2 Parent Sequence and Mutation Rules for Child Sequences; 2.3 Computational Assay; 2.4 ELISA Test; 3 Results and Discussions; 3.1 Molecular Simulation Results for Apt 8 and Apt 8_DNA; 3.2 The Candidate Sequences Predicted by Molecular Simulations; 3.3 Results of ELISA Assay; 4 Conclusions; Acknowledgements; References; Application of Deep Reinforcement Learning in Beam Offset Calibration of MEBT at C-ADS Injector-II; 1 Introduction 2 Physics structure3 Deep Reinforcement Learning Model; 4 Experiments and Results Analysis; 4.1 Experimental Environment; 4.2 Experimental Model Setup; 4.3 Results Analysis; 5 Conclusion; References; Predicting Students' Academic Performance Using Utility Based Educational Data Mining; Abstract; 1 Introduction; 2 Literature Review; 3 Materials andIntro; Contents; Research on Application's Credibility Test Method and Calculation Method Based on Application Behavior Declaration; Abstract; 1 Introduction; 2 Design of Credibility Verification Method; 2.1 Definition of ABD; 2.2 Application Implement Verification Module; 2.3 Tracking Module Records Actions of Application; 2.4 Verify Program Analysis Tracking Information; 3 Credibility Verification; 3.1 Standard of Credibility Verification; 3.2 Recessive Parameter Model and Calculation; 3.3 Credibility Judgment of Similar Behavior; 4 Conclusion; References The Selection of DNA Aptamers Against the Fc Region of Human IgGAbstract; 1 Introduction; 2 Materials and Methods; 2.1 Materials and Reagents; 2.2 Parent Sequence and Mutation Rules for Child Sequences; 2.3 Computational Assay; 2.4 ELISA Test; 3 Results and Discussions; 3.1 Molecular Simulation Results for Apt 8 and Apt 8_DNA; 3.2 The Candidate Sequences Predicted by Molecular Simulations; 3.3 Results of ELISA Assay; 4 Conclusions; Acknowledgements; References; Application of Deep Reinforcement Learning in Beam Offset Calibration of MEBT at C-ADS Injector-II; 1 Introduction 2 Physics structure3 Deep Reinforcement Learning Model; 4 Experiments and Results Analysis; 4.1 Experimental Environment; 4.2 Experimental Model Setup; 4.3 Results Analysis; 5 Conclusion; References; Predicting Students' Academic Performance Using Utility Based Educational Data Mining; Abstract; 1 Introduction; 2 Literature Review; 3 Materials and Methods; 4 Results and Discussion; 5 Conclusion; 6 Future Work; Acknowledgements; References; Theme Evolution Analysis of Public Security Events Based on Hierarchical Dirichlet Process; Abstract; 1 Introduction; 2 Research Background; 2.1 HDP 2.2 The Stick-Breaking Construction3 MD-HDP Theme Generation Model; 3.1 Model Frame; 3.2 Model of Stick-Breaking Construction; 3.3 Thematic Content Evolutionary Analyze Method; 4 Experiments; 4.1 Data Set; 4.2 Experimental Setting; 4.3 Thematic Evolution Analysis of Data Setting; 4.4 Model Effect Evaluation; 5 Conclusion and Future Works; Acknowledgements; References; Recurrent Neural Networks for Analysis and Automated Air Pollution Forecasting; 1 Introduction; 2 Background Review and Related Work; 2.1 Rhadoop; 2.2 Visualizations R Using the Shiny Server; 2.3 Recurrent Neural Networks 2.4 Realted Work3 System Design and Implementation; 3.1 System Architecture; 3.2 Lag-Time in RNN for Prediction; 3.3 RNN Model Optimization; 4 Experimental Environment and Results; 4.1 Experimental Environment; 4.2 RNN Parameters Optimization; 4.3 RNN Model Visualization; 5 Conclusion; References; A Social Influence Account of Problematic Smartphone Use; Abstract; 1 Introduction; 2 Literature Review; 3 Method; 4 Analysis and Conclusion; References; Simulation Analysis of Information-Based Animal Observation System; Abstract; 1 Introduction; 2 Related Work; 3 Model Development; 4 Analysis … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 004.6
Computer science -- Congresses
Databases -- Congresses
Information technology -- Congresses
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9789811336485
9811336482 - Related ISBNs:
- 9789811336478
- Notes:
- Note: Online resource; title from PDF title page (EBSCO, viewed May 22, 2019)
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.425954
- Ingest File:
- 02_538.xml