This book constitutes the Proceeding of the Sixth International Conference on Intelligent Data Analysis and Applications, October 15–18, 2019, Arad, Romania. This edition is technically co-sponsored by “Aurel Vlaicu” University of Arad, Romania, Southwest Jiaotong University, Fujian University of Technology, Chang’an University, Shandong University of Science and Technology, Fujian Provincial Key Lab of Big Data Mining and Applications, and National Demonstration Center for Experimental Electronic Information and Electrical Technology Education (Fujian University of Technology), China, Romanian Academy, and General Association of Engineers in Romania – Arad Section.
The book covers a range of topics: Machine Learning, Intelligent Control, Pattern Recognition, Computational Intelligence, Signal Analysis, Modeling and Visualization, Multimedia Sensing and Sensory Systems, Signal control, Imaging and Processing, Information System Security, Cryptography and Cryptanalysis, Databases and Data Mining, Information Hiding, Cloud Computing, Information Retrieval and Integration, Robotics, Control, Agents, Command, Control, Communication and Computers (C4), Swarming Technology, Sensor Technology, Smart cities.
The book offers a timely, board snapshot of new development including trends and challenges that are yielding recent research directions in different areas of intelligent data analysis and applications.
The book provides useful information to professors, researchers, and graduated students in area of intelligent data analysis and applications.
Daftar Isi
Trusted Io T Framework.- Utility-Oriented Pattern Analytic and Mining Techniques.- AI in Cyber Security: A boon & a bane.- Cleanroom Computing – Building Efficient and Secure Network Services.- Models and Methods of Design of Knowledge Based Fuzzy Neural Networks.- Seeing Is Believing.- Green Skyline Cities by Intelligent Rooftop Greenhouses.- The Unreasonable Effectiveness of Moore-Shannon Hammocks.- Designing Optical Sensors for the Internet of Things Era.- Adaptive density peak algorithm based on K-nearest neighbors with pre-screening strategy.
Tentang Penulis
Jeng-Shyang Pan received the B.S. degree in Electronic Engineering from the National Taiwan University of Science and Technology in 1986, the M.S. degree in Communication Engineering from the National Chiao Tung University, Taiwan in 1988, and the Ph.D. degree in Electrical Engineering from the University of Edinburgh, U.K. in 1996. He was selected for IET fellow in 2009 and Thousand Talent Program of China in 2010, respectively. Currently, he is a vice-president and dean of college of information science and engineering in Fujian university of technology, China. He has published about 700 research papers with total citations about 8200, h-index 42, and i-10 index 176. He is the founder of Journal of Information Hiding and Multimedia Signal Processing and two international conferences: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) and Euro-China Conference on Intelligent Data Analysis and Applications (ECC). His current research interests include artificial intelligence, information security, and image processing.
Valentina E. Balas is currently a full professor in the Department of Automatics and Applied Software at the Faculty of Engineering, “Aurel Vlaicu” University of Arad, Romania. She holds a Ph.D. in Applied Electronics and Telecommunications from Polytechnic University of Timisoara. Dr. Balas is the author of more than 300 research papers in refereed journals and inter-national conferences. Her research interests are in intelligent systems, fuzzy control, soft computing, smart sensors, information fusion, modeling, and simulation. She is the editor-in-chief to International Journal of Advanced Intelligence Paradigms (IJAIP) and to International Journal of Computational Systems Engineering (IJCSys E), the member in edito¬rial board member of several national and international journals, and is an evaluator expert for na¬tional, international projects, and Ph D thesis.
Chien-Ming Chen received the Ph.D. degree from the National Tsing Hua Univer¬sity, Taiwan. He is currently an associate professor with the College of Computer Science and Technology, Shandong University of Science and Technology, Shandong, China. His current research interests include network security, mobile internet, wireless sensor network, and cryp¬tography.