Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16–18, 2024.
The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections:
Volume I: Knowledge Science with Learning and AI (KSLA)
Volume II: Knowledge Engineering Research and Applications (KERA)
Volume III: Knowledge Management with Optimization and Security (KMOS)
Volume IV: Emerging Technology
Volume V: Special Tracks
.- Special Track.
.- Adversary and Attention Guided Knowledge Graph Reasoning based on Reinforcement Learning.
.- Evaluating GPT’s Programming Capability through CodeWars’ Katas.
.- An Online Portfolio Selection Algorithm with Dynamic Coreset Construction.
.- Interval-valued Fuzzy Portfolio decision Model with Transaction Cost and Liquidity Constraint.
.- Active Learning for Low-Resource Project-Specific Code Summarization.
.- A Survey of Game-Theoretic Methods for Controlling COVID-19.
.- ComPAT: a Compiler Principles course AssisTant.
.- Tram Air Conditioning Fault Prediction Using Machine learning.
.- Lexicon Graph Adapter based BERT Model For Chinese Named Entity Recognition.
.- Insider Threat Defense Strategies: Survey and Knowledge Integration.
.- GA-MEPS: Multiple Experts Portfolio Selection Based on Genetic Algorithm.
.- Deep Learning and Machine Learning-Based Approaches to Inferring Social Media Network Users’ Interests from a Missing Data Issus.
.- Customer Segmentation for Telecommunication using Machine Learning.
.- DP-MFRNN: Difficulty Prediction for Examination Questions Based on Neural Network Framework.
.- Causal Relationship Extraction Combined Boundary Detection and Information Interaction.
.- Profit Maximization in Edge-enabled Multimedia Data Market: A Game-based Pricing Approach.
.- Reinforcement learning for scientific application: A survey.
.- Zunna: A New Browser Extension for Protecting Personal Data.
.- HRTC:A Triple Joint Extraction Model Based on Cyber Threat Intelligence.
.- Personalized Image Aesthetics Assessment based onTheme and Personality.
.- A Spatio-temporal Neural Network for Medical Insurance Fraud Detection.
.- Exploring Language Diversity to Improve Neural Text Generation.
.- Diffusion Review-based Recommendation.
.- IntellectSeeker: A Personalized Literature Management System with the Probabilistic Model and Large Language Model.
.- A novel network intrusion detection method for unbalanced data in open scenarios.
.- Explainable Knowledge-Based Learning For Online Medical Question Answering.
.- Energy consumption prediction method for refrigeration systems based on adversarial networks and Transformer networks.
.- P-Vit: A simplified Vision Transformer model based on FFN and Simple Attention.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.