default search action
AISS 2021: Sanya, China
- AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26 - 28, 2021. ACM 2021, ISBN 978-1-4503-8586-2
- Mylene J. Domingo, Lance Christian L. Pua, Willson Pierce S. Pua, Hans Chester S. Talag:
University of Santo Tomas Department of Filipino Virtual Front Desk. 1:1-1:6 - Mylene J. Domingo, John Christian B. Fudotan, Alexandria Therese R. Sadang, Allyssa Bea R. Topacio, Jeremie Jun C. Viray:
MATYAG: A Tracking System to Prevent Potential Cases of Human Trafficking. 2:1-2:5 - Yuting Zhou, Xuemei Yang, Xiaoying Wang, Junping Yin:
Comparison of the proportional hazard model and the accelerated failure model in the mixed cure model. 3:1-3:6 - Liu Yang, Yan He, Shouye Lv, Jian Ma:
Radar Working Mode Recognition Method Based on Complex Network Analysis. 4:1-4:8 - Yexuan Ma, Chaobing Huang:
Facial Expression Recognition Based on Deep Learning and Attention Mechanism. 5:1-5:6 - Lei Zhang, Jinghua Sun, Ling Li, Jinling Cheng:
Commercial Aircraft On-Board Loadable Software Distribution and Control Digital Solution. 6:1-6:5 - Ruyi Chen, Shengwu Xiong:
Few-shot Adversarial Audio Driving Talking Face Generation. 7:1-7:6 - Jingchao Chen, Shiyi Mu, Shugong Xu, Youdong Ding:
HENet: Forcing a Network to Think More for Font Recognition. 8:1-8:5 - Yunqiang Gao, Yan Shen, Zhe Yang, Dapeng Chen, Mingxin Yuan:
Immune Optimization Algorithm for Traveling Salesman Problem Based on Clustering Analysis and Self-Circulation. 9:1-9:7 - Xinye Zhao, Mei Yang, Cui Peng, Chao Wang:
Research on Intelligent Operational Assisted Decision-making of Naval Battlefield Based on Deep Reinforcement Learning. 10:1-10:7 - Tianyu Liu, Lei Yao, Bo Qiu, Pengqizi Huang:
A Residual Life Prediction model for Bivariate Degraded Products Based on Copula and Particle Filtering. 11:1-11:6 - Weiwei Zhang, Feng Gao, Haofang Liu:
Nonlinear Controller Design for Power System via TS Fuzzy Model. 12:1-12:4 - Yaru Sun, Ying Yang, Yongjian Wang:
Attention-Based Sub-Word Network for Multilingual Short Text Classification. 13:1-13:6 - Jia Yu:
Citizen adoption of e-justice services: An empirical research in China. 14:1-14:5 - Xuan Wang, Ziyang Chen, Ziyang Chen:
Research on the Optimal Methods for Graph Edit Distance. 15:1-15:7 - Qinghe Liu, Yinghong Tian:
An Improved GAIL Based on Object Detection, GRU, and Attention. 16:1-16:8 - Yunhe Li, Huiyan Zhao, Bo Li, Yi Wang:
x4 Super-Resolution Analysis of Magnetic Resonance Imaging based on Generative Adversarial Network without Supervised Images. 17:1-17:5 - Yujia Fu, Jingling Wang:
Modeling of Sports News Information Dissemination in Social Networks. 18:1-18:6 - Zhongxuan Cai, Minglong Li:
A Robust and Learning Approach for Multi-Phase Aerial Search with UAVs. 19:1-19:5 - Xiaofei Qu, En Long, Shouye Lv, Pengfei Chen, Guangling Lai, Yuke Yang, Jisheng Du:
Ship Detection Method based on Scale Matched R3Det. 20:1-20:6 - Hua Jiang, Heng Zhang, Huijiao Wang, Xin Wang:
A Frequency-first Heuristic for Shortest Linear Programs. 21:1-21:6 - Zhongxuan Cai, Xuefeng Chang, Minglong Li:
A Cost-Efficient Platform Design for Distributed UAV Swarm Research. 22:1-22:6 - Xin Du:
FISC: Furniture image style classification model based on Gram transformation. 23:1-23:5 - Guoyi Wen, Yong Huang, Hongbo Yuan, Botao Tang, Haijia Zhang:
Design and realization of small anti-jamming GNSS antenna based on LTCC. 24:1-24:7 - Xinglong Cui, Ting Sun, Shuixin Deng, Yusen Xie, Lei Deng, Baohua Chen:
Unsupervised Barcode Image Reconstruction Based on Knowledge Distillation. 25:1-25:6 - Youna Jung, Noah Goldsmith, John Barker:
Survey of Trust Management on Mission-oriented Internet of Things. 26:1-26:5 - Benjamin Nast, Kurt Sandkuhl:
Meta-Model and Tool Support for the Organizational Aspects of Internet-of-Things Development Methods: Organizational Aspects of IoT Development Methods. 27:1-27:6 - Linxi Li:
Perspective on Intelligent Sensing System. 28:1-28:5 - Qihe Liu, Gao Yu, Yuanyuan Wang, Zeng Yi:
A Novel DGA Domain Adversarial Sample Generation Method By Geometric Perturbation. 29:1-29:10 - Dipendra Pant, Rabindra Bista:
Image-based Malware Classification using Deep Convolutional Neural Network and Transfer Learning. 30:1-30:6 - Tao Leng, Aimin Yu:
A Framework of Darknet Forensics. 31:1-31:6 - Bidong Wang, Hui Liu, Xinli Han, Dongliang Xuan:
Image-based Ransomware Classification with Classifier Combination. 32:1-32:6 - Gloria Virginia, Juan Christian Tjandra, Budi Susanto, Umi Proboyekti:
Search Engine Optimization by Re-Ranking the Product Search Result Based on User Click Data. 33:1-33:5 - Huiwen Fang, Chunhua Wu:
Neural Network Model Extraction Based on Adversarial Examples. 34:1-34:5 - Qinghuan Rao, Bin Wu:
Evaluation Model Based on Hesitation Fuzzy Theory. 35:1-35:8 - Ruonan Wang, Yuefeng Zhao:
A Survey on Anonymous Communication Systems Traffic Identification and Classification. 36:1-36:5 - Kittipat Saengkaenpetch, Chaodit Aswakul:
Cloud-Based Smart Energy Framework for Accelerated Data Analytics with Parallel Computing of Orchestrated Containers: Study Case of CU-BEMS. 37:1-37:6 - Yi Su, Baosheng Wang, Qianqian Xing, Xiaofeng Wang:
DISCA: Decentralized Infrastructure for Secure Community Attribute certifying. 38:1-38:8 - Su-Tzu Hsieh, Chin-Ta Chen:
Facial recognition with mask during pandemic period by big data technical of GMM. 39:1-39:3 - Luiz Fernando Capretz, Pradeep Waychal, Jingdong Jia, Shuib Bin Basri:
Comparing the Popularity of Testing Careers among Canadian, Indian, Chinese, and Malaysian Students. 40:1-40:7 - Jiao Peng, Shulin Yang, Xiang Li, Meiqi Zhou, Yongliang Huang:
Research on the Application of Blockchain in Educational Resources. 41:1-41:5 - Jie Zhang, Zipeng Zhang:
Research on Fermented Grains Steam Running Condition Prediction Model of Make Chinese Liquor Robot Based on GRU. 42:1-42:4 - Ping Jian:
Research on the information System architecture design framework and reference resources of American Army. 43:1-43:5 - Ruyun Zhang:
Preliminary Study of Secure-Enhanced Coherent Optical Orthogonal Frequency Division Multiplexing System Based on DNA Encoding. 44:1-44:6 - Guo-qing Ye, Xiao-tong Wang, Han-chang Wang, Yun-fa Zhou:
Wartime Consumption Prediction of Aircraft Carrier Airborne Ammunition Based on Case-Based Reasoning. 45:1-45:5 - Xiaohui Jia, Shuyang Qu, Tilei Gao, Bingfu Mou:
Research on Calculation Method of Software Service Risk Occurrence Probability Based on Markov Chain Theory. 46:1-46:5 - Wanli Yang, Huawei Li, Fei Wang, Dianle Zhou:
Cell Tracking based on Multi-frame Detection and Feature Fusion. 47:1-47:6 - Yang Xia, Chaobing Huang:
Chinese Intention Recognition Algorithm Based on BERT-GRU-Capsule Network. 48:1-48:6 - Huijia Ye, Juwei Rao, Yang Shi, Zhihua Li:
ProExtor: Mining API Protocols for Program Vulnerability Detection. 49:1-49:7 - Cong Xu, Haicheng Liu, Xinglei Miao:
Weak Target Detection Based on Message Passing Network Fusion with Deep Neural Network. 50:1-50:4 - Lu Yu, Wenjing Nie, Lun Xin, Manxue Guo:
Clustered Federated Learning Based on Data Distribution. 51:1-51:5 - Juan He, Mengya Li, Rong Zhou, Li Ning, Yan Liang:
Rapid Identification of Multiple Gases. 52:1-52:6 - Vladimir Kazakovtsev, Sergey Muravyov:
Application of the automatic selection and configuration of clustering algorithms method for the Apache Spark framework. 53:1-53:5 - Qianli Zhang, Qiusheng Li, Junyong Hu, Xianghui Xie:
Real-time detection of navel orange fruits in the natural environment based on deep learning. 54:1-54:7 - Xinjie Lan, Samet Bayram, Kenneth E. Barner:
An Information Theoretic Defense Algorithm against Adversarial Attacks on Deep Learning. 55:1-55:5 - Chen Chen, Zhao Zhao, Zhi-yong Xu:
Refinement of TDOA Measurements for Flush Mounting Planar Microphone Arrays Using Low Rank and Linear Geometric Constraints. 56:1-56:6 - Xuerui Chen, Guohua Peng:
Domain adaptation based on the measure of kernel-product maximum mean discrepancy. 57:1-57:6 - Kang Chen, Dehong Qiu:
Combined Metapath Based Attention Network for Heterogenous Networks Node Classification. 58:1-58:6 - Mengya Li, Juan He, Rong Zhou, Li Ning, Yan Liang:
Research on prediction model of mixed gas concentration based on CNN-LSTM network. 59:1-59:5 - Shuang Han, Mingjun Li, Boxuan Guo:
The high order finite volume weighted essentially non-oscillatory schemes to solve the Rayleigh-Taylor Instability. 60:1-60:5 - Kexin Jia, Yuxia Xin, Ting Cheng:
A Robust Multi-Sphere SVC Algorithm Based on Parameter Estimation. 61:1-61:5 - Suodong Liu, Lijia Tao, Chao Liu, Yunqiang Gao, Hongwei Sun, Mingxin Yuan:
Immune Cloning Optimization Algorithm Based on Antibody Similarity Screening and Steady-State Adjustment. 62:1-62:5 - Gang Chen, Su Jun Wang, Yifan Ping, Yi Jin, Changzhi Xu, Ying Zhao Shao, Zhao Han:
Mismatched filtering for Doppler ambiguity sidelobe suppression in passive bistatic radar. 63:1-63:6 - Su Jun Wang, Yifan Ping, Gang Chen, Li Yang, Wei Wen, Changzhi Xu, Ying Zhao Shao:
Target detection of remote sensing images based on deep learning method and system. 64:1-64:7 - Guodong Jiang, Jingjing Zhang, Jinyin Chen, Haibin Zheng, Zhiqing Chen, Liang Bao:
Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm. 65:1-65:6 - Yuanyuan Qu, Wenxue Wei, Jiajia Jiang, Yufeng Liang:
Neural-network-based Approach to Detect and Recognize Distorted Text in Images with Complicated Background. 66:1-66:7 - Yanjia Zhang:
Groovy Pixels: Generating Drum Set Rhythms from Images. 67:1-67:5 - Maoxian Zhou, Secha Jia, Rangjia Cai:
Research on Tibetan-Chinese Neural Machine Translation Integrating Syntactic Information. 68:1-68:4 - Xiaohua Zhou, Xinkai Meng, Guanghui Sun, Jainbin Zheng, Wenrui Ye:
Automatic selection of ambient noise observation stations based on the clustering algorithm. 69:1-69:6 - Khulood Faisal, Dareen Alomari, Hind Alasmari, Hanan S. Alghamdi, Kawther Saeedi:
Life Expectancy Estimation based on Machine Learning and Structured Predictors. 70:1-70:8 - Chaojie Wang:
A pattern-spectrum-based AP method for classification of noised speech signals. 71:1-71:5 - Quan Nguyen, Jingru Zhang:
Line-Constrained L∞ One-Center Problem on Uncertain Points. 72:1-72:5 - Chusi Huang, Jiandong Li:
Research on automatic leveling Control based on improved PID Neural Network. 73:1-73:10 - Qin Li, Wei Liu, Chaoyang Niu, Yanyun Wang, Ouyang Gao, Yintu Bao, Weiqi Zou, Haobo Zhang, Qing Hu, Zhikang Lin, Chaofan Pan:
The influence of different preprocessing on radar signal recognition based on time-frequency analysis and deep learning. 74:1-74:5 - Shengjie Ding, Juan Liu, Lingfu Xie:
UAV-enabled Edge Computing for Virtual Reality. 75:1-75:8 - Li Xu, Juan Liu, Lingfu Xie, Xiaofan He:
Multi-UAV Navigation and Recharging for Fair and Sustainable Coverage in Wireless Networks. 76:1-76:6 - Jinjin Liu, Zhifeng Chen, Xiaonan Li, Tongxin Wei:
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System. 77:1-77:6 - Chen Zhang, Juan Liu, Lingfu Xie, Xiaofan He:
Age-Optimal Data Gathering and Energy Recharging of UAV in Wireless Sensor Networks. 78:1-78:6 - Jose Emmanuel Cruz de la Cruz, Eudes Rigoberto Apaza Estaño, Luis Enrique Baca Wiesse, Oscar Jhon Vera Ramirez, Wilson Antony Mamani Machaca:
Prediction of power of a photovoltaic system in height using hybrid models of Shinkrage regularization with RFE and SFS. 79:1-79:5 - Dongjie Li, Dong Li, Chuanpeng Wang, Yinan Chen:
Network Embedding Method Based on Semantic Information. 80:1-80:6 - Hao Chen, Jiajia Wang, Yurong Liu, Jiangtao Xu, Chao Fan:
Rearch on quantitative evaluation technology of equipment battlefield environment adaptability. 81:1-81:5 - Changyou Shi, Jianping Lu, Qiang Sun, Shiliang Cheng, Xin Feng, Wei Huang:
Image Dehazing Via Cycle Generative Adversarial Network. 82:1-82:7 - Zhe Liu, Weijie Xia, Yongzhen Lei:
SAR-GPA: SAR Generation Perturbation Algorithm. 83:1-83:6 - Di Meng Shi, Jun Ji:
Method design based on the national scholarship system. 84:1-84:4 - Yu Gu, Jiangan Li:
A Novel WiFi Gesture Recognition Method Based on CNN-LSTM and Channel Attention. 85:1-85:4 - Nan Zhang, Chao Guo, Fei Li:
A Correction Method for Attitude Measurement in Steerable Drilling System. 86:1-86:5 - Joselito Medina Marín, Maria Guadalupe Serna-Diaz, Juan Carlos Seck Tuoh Mora, Norberto Hernandez-Romero, Irving Barragán-Vite, Cinthia Montano-Lara:
Static Analysis for the No Termination Problem in Active Databases by Using Petri Nets Modelling. 87:1-87:7 - Hongrui Min, Chao Chen, Shixin Huang, Xiaorui Tian, Yongkui Yang, Zheng Wang:
Highly-accurate gesture recognition based on ResNet with low-budget data gloves. 88:1-88:6 - Xianbin Hong, Sheng-Uei Guan, Prudence W. H. Wong, Nian Xue, Ka Lok Man, Dawei Liu, Zhen Li:
Lifelong Machine Learning-Based Quality Analysis for Product Review. 89:1-89:5 - Michael Chima Ogbuachi, Itilekha Podder, Udo Bub, Murad Huseynli:
A Framework for Quantifiable Process Improvement through Method Fragments in Situational Method Engineering. 90:1-90:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.