

Beschreibung
This 2-volume set CCIS 2778+2779 constitutes the proceedings of the Third International Conference on Applied Intelligence, ICAI 2025, held in Nanning, China, during November 69, 2025. The 70 full papers presented in this proceedings were carefully selected a...
This 2-volume set CCIS 2778+2779 constitutes the proceedings of the Third International Conference on Applied Intelligence, ICAI 2025, held in Nanning, China, during November 69, 2025.
The 70 full papers presented in this proceedings were carefully selected and reviewed from 289 submissions.
They were organized in topical sections as follows:
Part I: Image Processing; Knowledge Discovery and Data Mining; Machine Learning; Pattern Recognition.
Part II: Biomedical Data Modeling and Mining; Neural Networks ; Pattern Recognition.
Inhalt
.- Image Processing.
.- Enhanced Sonar Scan Image Detection and Classification with a Modified YOLOv8 x Algorithm.
.- Multi-Spectral Vehicle Re-Identification via Cycle-Consistent Flow in Modality Missing.
.- Domain-Adapted CLIP with Anatomy-Aware Synthetic Lesions for Unsupervised Chest X-Ray Anomaly Detection.
.- A technique for processing mammography images toward identifying calcifications.
.- Detection and Segmentation Methods Synergistically Driven for Complex Field Crops-Intelligent Identification of Weeds and Accurate Localisation of Root Systems.
.- Efficient and Precise Adjustment Method for Automotive Ambient Lighting Luminance and Chromaticity Based on Helical Approaching Algorithm.
.- Anisotropic 3D EM Image Segmentation with State-Space Mode.
.- A Hybrid Optimization Algorithm for Automatic Image Segmentation.
.- Knowledge Discovery and Data Mining.
.- The Biomedical Knowledge Discovery in the Field of Hematopoietic Stem Sells based on Guided Local Search.
.- LLM-Driven Knowledge Discovery and Fusion for Automotive Powertrain Energy Systems.
.- Explain Graph Node Classification via Counterfactual Memorization.
.- REALM: Reinforcement Learning-based Cross-modal Alignment for Fine-grained Medical Report Generation.
.- Multi-View Anomaly Detection Enhanced by Motif-Augmented Graphs.
.- From Topology to Semantics: A Unified Theory of Attributed Graphs for Contextual Intelligence in Data Systems.
.- Inferring Anomalous Source Nodes in Power Grid Supply Chain Networks.
.- Learning Influence Strengths between Nodes in Supply Chain Networks.
.- Machine Learning.
.- Conditional Generation of Nanyin with Transformer.
.- High-Performance Interactive Volume Cloud Rendering on Low-End Devices.
.- Data-Driven Solutions to Urban Governance Resource Dilemmas: A Case Study of the 12345 Hotline Service System in Ankang City, Western China.
.- Research on the ACT Algorithm Based on the Dual-Arm Robotic Manipulator Transformer-CVAE Architecture.
.- BSD-PPO: A Fusion Algorithm for Dual-Arm Robot Collaborative Optimization and Dynamic Collision Avoidance.
.- Research on Hierarchical Reasoning Method Based on Flow Matching.
.- Concrete Crack Detection using Lightweight CNN Models.
.- Hybrid Kernel Function-Based Twin Support Vector Machine Algorithm.
.- DPC-MNND: Density Peaks Clustering Based on Mutual Nearest Neighbor Density Allocation.
.- Bidirectional Long Short-Term Memory-based Twin Support Vector Machine.
.- Narrative2Nanyin: Generative Applied Intelligence for Heritage Nanyin Music.
.- Adolescent Posture Recognition for Myopia Prevention Based on YOLOv8 and Multi-Modal Sensor Fusion.
.- Local Structure-Aware Deep Metric Learning.
**.- Pattern Recognition.
** .- Mitigating Cyber Risks Amidst Geo-Political Tensions: a Computational Analysis Based on Adaptive Networks.
.- Deep Learning for Humanoid Robot Vision:A Survey.
.- LTT-Net: A Lightweight Transformer-TCN Network for Gesture Recognition Using mmWave Radar Point Clouds.
.- Towards Trustworthy Text Image Recovery: Semantic Traceability with Watermark Indexing and Diffusion Inpainting.
.- An Infrared Vessel Detection Model based on Bidirectional Selective Path Aggregation Network.
.- Topology Control Algorithm for Mobile Wireless Sensor Networks Based on Disability Measurement and Evaluation.
.- Cracking the Code: Data-Driven Insights into Global Cybercrime and Policy Effectiveness.
.- Quantum-inspired Honey Badger Algorithm for Training Feedforward Neural Networks.
.- A Novel Microchip Electrophoresis Signal Smoothing Algorithm Based on Multi Objective Optimization Strategy.
