Avoid common mistakes on your manuscript.
This special issue includes selected papers (with no less than 60% new content of the journal version) from the 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), October 30, 2021, online conference as well as an open call. The submitted manuscripts were reviewed by experts from both academia and industry. After two rounds of reviewing, the highest quality manuscripts were accepted for this special issue. This special issue will be published by Neural Computing and Applications as special issues. The papers are summarized as follows.
Qu et al. [1] presents a model-based single-phase fault-tolerant control as a safety measure that is able to estimate speed and signal delay for Hall-effect sensors of BLDC motors used in the active waist exoskeleton. Huo et al. [2] designed the backbone noise reduction network as a GAN framework that can be internally optimized. Wang et al. [3] puts forward the optimized BP neural system as the financial early warning model and ensures its high prediction accuracy. Aiming at these two difficulties, an intelligent traceability algorithm based on dynamic multi-mode optimization was designed and proposed in the work [4]. Key technologies for a digital twin-based shop floor management and control system are investigated, and the concept is designed and implemented by Peng and Zheng [5]. Huang and Guo [6] aims to make acupuncture give full play to its own advantages in the treatment of non-motor symptoms of Parkinson's disease by studying the meta-analysis of the efficacy of acupuncture and moxibustion in the treatment of non-motor symptoms of Parkinson's disease. Jiang et al. [7] examines the relationship between cloud-native architecture flexibility and cloud provider value and the processes and the boundary condition by which cloud-native architecture flexibility affects cloud provider value based on innovation theory and dynamic capability theory. Through the research on the application of convolutional neural network in the field of image segmentation, the problems of low segmentation accuracy, long time and high cost in the task of aerial image building image segmentation are solved to a certain extent [8]. Pang et al. [9] propose the network sorting rules and searching rules, and construct the network sorting search algorithm to track loan lost-linking customers in different address types. In the preprocessing of gesture images, an improved Otsu method is proposed to improve the real-time performance to realize the threshold segmentation of the human hand; then the morphological processing is carried out, and the median filter method is used to achieve image denoising to improve image quality [10].
Wang and Zhao [11] uses a combination method of qualitative and quantitative to identify the influencing factors of risk estimation to obtain relevant influencing factors, and verify the model proposed in this paper in combination with experimental research. Wu [12] completed the traditional image noise detection and segmentation experiment based on convolutional neural network. Based on the mixed Gaussian background model, the detection target is segmented by the different methods, and the most matching target track is found by using the location information and color information of the detection target, so as to realize the vehicle tracking [13]. Zhang et al. [14] uses it to understand the distribution law of traffic data and the internal connections between data, excavate traffic characteristics in smart cities, and accurately predict the future traffic situation, so as to solve the problems of traffic congestion and route planning in smart cities. A multi-scale memory-enhanced prediction method is proposed to describe fully characteristics of the data [15]. Li [16] presents an in-depth study and analysis of the AC drive control simulation of a supercapacitor tram using a high-order neural network pattern discrimination algorithm. Wu et al. [17] study the rough concept lattice and use the information flow to construct a second-order cone programming model for big data. The relay protection characteristics of DN under DG access are analyzed by Cui et al. [18]. Zhou et al. [19] examined the impacts of market conditions on the choice of contract and timing for information system outsourcing. Real options approach is applied to develop several analytical models to investigate the decision making for outsourcing information system.
References
Yang L, Qu C, Jia B et al (2022) The design of an affordable fault-tolerant control system of the brushless DC motor for an active waist exoskeleton. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07362-7
Chang Y, Wu Q, Chi L et al (2022) CT manifestations of gallbladder carcinoma based on neural network. Neural Comput Applic. https://doi.org/10.1007/s00521-022-06973-4
Li X, Wang J, Yang C (2022) Risk prediction in financial management of listed companies based on optimized BP neural network under digital economy. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07377-0
Wu Q, Wu B, Yan X (2022) An intelligent traceability method of water pollution based on dynamic multi-mode optimization. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07002-0
Peng F, Zheng L (2022) Fuzzy rule-based neural network for high-speed train manufacturing system scheduling problem. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07190-9
Huang G, Guo M (2022) Meta-analysis of the efficacy of acupuncture and moxibustion in the treatment of non-motor symptoms of Parkinson’s disease. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07198-1
Jiang M, Wu L, Lin L et al (2022) Cloud-native-based flexible value generation mechanism of public health platform using machine learning. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07221-5
Deng Y, Xie X, Xing C (2022) CNN-based architecture recognition and contour standardization based on aerial images. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07288-0
Pang S, Wang J, Yi X (2022) Application of loan lost-linking customer path correlated index model and network sorting search algorithm based on big data environment. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07189-2
Chen H, Zhao H, Qi B et al (2022) Gesture recognition of graph convolutional neural network based on spatial domain. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07040-8
Wang S, Zhao Z (2022) Risk decision analysis of commercial insurance based on neural network algorithm. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07199-0
Wu Q (2022) Research on deep learning image processing technology of second-order partial differential equations. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07017-7
Ge Dy, Yao Xf, Xiang WJ et al (2022) Vehicle detection and tracking based on video image processing in intelligent transportation system. Neural Comput Applic. https://doi.org/10.1007/s00521-022-06979-y
Zhang Y, Wang H, Wang X (2022) Research on the improvement of transportation efficiency of smart city by traffic visualization based on pattern recognition. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07222-4
Chen W, Liu C, Chen Q et al (2022) Multi-scale memory-enhanced method for predicting the remaining useful life of aircraft engines. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07378-z
Li L (2022) Simulation of AC drive control for supercapacitor trams based on high-order neural network pattern discrimination algorithm. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07548-z
Wang P, Wu W, Zeng L et al (2022) Information flow-based second-order cone programming model for big data using rough concept lattice. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07289-z
Zeng P, Cui S, Song C et al (2022) A multiagent deep deterministic policy gradient-based distributed protection method for distribution network. Neural Comput Applic. https://doi.org/10.1007/s00521-022-06982-3
Zhang Z, Liao R, Zhou Q (2022) Contracting and timing for outsourcing of information system with uncertain requirements. Neural Comput Applic. https://doi.org/10.1007/s00521-022-07355-6
Acknowledgements
The guest editors would like to thank Prof. John MacIntyre who is the editor in chief of Neural Computing and Applications. The guest editors would like to thank the reviewers for their high-quality reviews, which provided insightful and constructive feedback to the authors of the papers. The guest editors also would like to thank journal editor Dr. Amin Fatemi, Deepika Sureshkumar, and Rashmi Jenna for their help on submission and publication.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhao, J. Special issue on 2021 international conference on machine learning and big data analytics for iot security and privacy. Neural Comput & Applic 35, 2025–2026 (2023). https://doi.org/10.1007/s00521-022-07706-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-022-07706-3