


default search action
AIIPCC 2019: Sanya, China
- João Manuel R. S. Tavares, Zeshui Xu:

Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing, AIIPCC 2019, Sanya, China, December 19-21, 2019. ACM 2019, ISBN 978-1-4503-7633-4 - Wentao Wang, Canhui Liao, Quan Cheng, Pengju Wang:

Mixed convolutional recurrent neural networks: learning for signal classification. 1:1-1:6 - Tao Yang, Hongli Deng:

Intelligent sentence completion based on global context dependent recurrent neural network language model. 2:1-2:5 - Yoojeong Song, Jongwoo Lee:

Design of stock price prediction model with various configuration of input features. 3:1-3:5 - Yun Ge, Guodong Jing:

Infrared and visible image fusion using multi-resolution convolution neural network. 4:1-4:5 - Xuan Zheng, Bo Fu, Xilin Zhao, Yi Quan, Zhenyu Lin, Meng Gong:

Denoising algorithm based on bilateral filtering and improved wavelet threshold function. 5:1-5:5 - Dongdong Zhang, Dong Cao, Haibo Chen:

Deep learning decoding of mental state in non-invasive brain computer interface. 6:1-6:5 - Qiang Chen

, Shaoyu Wang
, Lirong Yi, Wenting Shu, Rui Wang, Jue Chen:
Traffic signs recognition using dynamic-scale CNN. 7:1-7:5 - Ahmet Göncü:

Prediction of exchange rates with machine learning. 8:1-8:5 - Peng Wang, Cui Ni, Kefeng Li:

Vision-based highway traffic accident detection. 9:1-9:5 - Yuwei Pang, Dong Hu, Min Sun:

A modified scheme for liver tumor segmentation based on cascaded FCNs. 10:1-10:6 - Xingxu Cai, Yi'an Liu, Ying Xiao:

Bridge displacement prediction method based on ARIMA model. 11:1-11:6 - Jiafei Niu, Peiqing Niu:

An intelligent automatic valuation system for real estate based on machine learning. 12:1-12:6 - Wen Liu, Yaokai Mo, Jichao Jiao:

An efficient edge-feature constraint visual SLAM. 13:1-13:7 - Wei Zhang, Jiaojie Li, Xuyi Qiu:

SAR image super-resolution using deep residual SqueezeNet. 14:1-14:5 - Chunyan Liu, Xiaohong Qian:

Health assessment of EMU based on convolutional neural network. 15:1-15:5 - Hongjie Yu, Yuchen Zhao:

Chaotic synchronization of composite H-R networks. 16:1-16:5 - Lina Yang, Ying Yang, Huanhuan Yu, Guichun Zhu:

Anonymous market product classification based on deep learning. 17:1-17:5 - Baoshan Zhang, Lin Zhang, Xuan Wang, Bo Zhang, Bo Li, Peigeng Li:

Fault diagnosis model of deep belief networks based on adaptive genetic algorithm optimization. 18:1-18:6 - Lu Han, Xianjun Shi, Jiapeng Lv, Yuyao Zhai, Houjun Liu, Taoyu Wang:

Lithium-ion battery capacity prediction based on grey neural network model. 19:1-19:6 - Igor Bikeev, Pavel Kabanov

, Ildar Begishev
, Zarina Khisamova:
Criminological risks and legal aspects of artificial intelligence implementation. 20:1-20:7 - Alexander A. Potapov, Wei Zhang, Tianhua Feng, Sergo Rekhviashvili:

Sigma-pi neural unit: switching circuit simulation. 21:1-21:5 - Guangliang Zhou, Changhui Hu, Xiaoyuan Jing, Jian Yu, Shen Jing:

The face recognition based on ensemble method. 22:1-22:5 - Lihua Zhou, Juanjuan Li, Suping Fang:

A look-ahead micro-segment smoothing algorithm based on improved S-curve acceleration and deceleration. 23:1-23:5 - Pius Kwao Gadosey

, Yujian Li, Peter T. Yamak:
On pruned, quantized and compact CNN architectures for vision applications: an empirical study. 24:1-24:8 - Lei Peng, Wenzhong Qu, Yan Zhao, Yunkun Wu:

A multi-level network for radio signal modulation classification. 25:1-25:5 - Xi Fang, Xin Sui, Yixin Fu, Junying Mao, Ding Ding, Ronglei Hu

, Yuchao Wang, Zhufeng Suo, Yueyang Yu:
K-means-based channel equalization method for polarization-division-multiplexed optical OFDM/OQAM systems. 26:1-26:5 - Yuan Jiang, Jianwei Li:

Feature reusing and semantic aggregation for single stage object detector. 27:1-27:6 - Jinyong Yin, Jian Yang, Hongbin Yang, Zexing Du:

A CNN accelerator on embedded FPGA using dynamic reconfigurable coprocessor. 28:1-28:5 - Yang Yang, Fei Lin, Dingguo Yu, Jiefang Zhang, Chen Yang, Qiang Lin:

A traffic flow hierarchy induction algorithm based on VANET. 29:1-29:6 - Yushi Liu

, Zhen Tian, Karin Yanagi
, Lixin Liu, Chengcai Lv:
Carcinogenicity prediction by in vitro human liver cell gene expression and chemical structure. 30:1-30:9 - Guanghui Xu, Qingsong Zhang, Na Li, Lecheng Ouyang, Tong Zhao, Qihuan Chen:

Closed-loop detection and repositioning method based on bag of word. 31:1-31:7 - Dong Cao, Lisha Xu, Dongdong Zhang:

Cross-enhancement transform two-stream 3D ConvNets for action recognition. 32:1-32:5 - Ali Mohsin, Qingsong Niu, Xinyu Wang, Min Shao, Haixiu Zhang, Shouwang Zhang, Xiaoming Zhang:

Application of bean optimization algorithm in ranking model for Dangshan pear germplasm resources nature reserve based on fuzzy preference relationships. 33:1-33:6 - Yin Long, Changhua Liu:

Research on deep learning method of crop disease identification. 34:1-34:6 - Bin Zhang, Haibin Xia, Hun-ok Lim:

Development of an AI based teaching assisting system. 35:1-35:5 - Wenxing Zhang, Pengfei Zhao, Jianguo Wang, Wenjing Liu:

A gear fault diagnosis method based on manifold semi-supervised K-means clustering algorithm. 36:1-36:5 - Jiawei Yang

, Susanto Rahardja
, Pasi Fränti:
Outlier detection: how to threshold outlier scores? 37:1-37:6 - Yang Liu, Shiqing Zou, Xianguo Wu, Jiaying Teng:

Research on selection of exterior window of residence building based on numerical simulation. 38:1-38:6 - Jici Xing, Guoying Liu, Jing Xiong:

Oracle bone inscription detection: a survey of Oracle bone inscription detection based on deep learning algorithm. 39:1-39:8 - He Liu, Xiaohui Wang, Shuya Lei, Xi Zhang, Weiwei Liu, Ming Qin:

A rule based data quality assessment architecture and application for electrical data. 40:1-40:6 - Wenkai Wang, Liang Chang, Chenzhong Bin, Wen Xuan, Wei Chen, Long Li:

ESN-NER: entity storage network using attention mechanism for chinese NER. 41:1-41:8 - Yan Wang:

Decision-making model based on set pair analysis and optimal combination weight for schemes of eco-type revetment. 42:1-42:5 - Shuan Yan, Hongyong Yuan, Yan Gao

, Boao Jin, Yifan Ma, Lizheng Deng
:
Experimental investigation on detection and location of leakage in buried water-filled pipelines under different types of sensor arrays and soils. 43:1-43:8 - Xianyi Cheng, Guohua Ji, Xiaohua Zhang, Fengmei Chen:

The semantic tagging model of chinese question sentence chunk based on description logics. 44:1-44:6 - Wei Lu, Bin Deng, Wei Zhang, Jingjing Wang, Liang Zhong, Shixin Peng:

Channel feedback based on complex 1-bit Bayesian compressed sensing in FDD massive MIMO systems. 45:1-45:6 - Yong Hou, Yan Feng, Jie Hao:

Two-dimensional DOA estimation algorithm based on time-frequency point selection. 46:1-46:5 - Yi Zhao, Xin Chen, Junxiang Wang:

A survey of reversible data hiding based on HEVC video compression format. 47:1-47:9 - Fengsui Wang, Furong Liu, Shuming Zhu, Linjun Fu, Zhengnan Liu, Qisheng Wang:

HEVC intra frame based compressed domain video summarization. 48:1-48:7 - Xinfeng Ye, Sathiamoorthy Manoharan

:
Providing automated grading and personalized feedback. 49:1-49:5 - Caiping Li, Lei Chang, Jisheng Zhang, Xiaoming Zhou, Zhen Hu, Yuanchen Song:

Adaptive recommendation technology for remote sensing information based on behavior analysis. 50:1-50:5 - Licheng Li, Chenlu Qiu, Aifen Fang:

Detection of test cheating by outlier analysis approach using probability estimation. 51:1-51:5 - Lan Lin, Yuchao Wu, Xuetao Wu, Shuicai Wu:

APOE-ε4 allele load modifies the brain aging process in cognitively normal late middle aged and older adults. 52:1-52:5 - Xiaoli Guo, Qing Chen, Yin Li:

On the square-based montgomery multiplier for a class of type C.2 pentanomial. 53:1-53:5 - Mingwen Chi:

An improved wolf pack algorithm. 54:1-54:5 - Rui Cui, Jifei Pan, Jing Zhu:

Research on jamming effect evaluation method of AN/TPY-2 radar using set pair approach degree. 55:1-55:5 - Shaozheng Zhu, Jirong Xin, Wuzhong Luo, Wenqi Tang:

Analysis of the jamming method for high frequency M-dimensional orthogonal modulated signals. 56:1-56:5 - Jian Li, He Song, Xuemei Wei, Jiahui Liang:

Result analysis of Kaiman filter for unobservable systems. 57:1-57:5 - Zhengwu Wu, Feng Ding, Xu Yan, Shusen Zhang, Donghao Yang, Xiaolong Mao:

An associated probability analysis model based on multi-element fusion. 58:1-58:7 - Ping Wang, Jin Qiu:

An adaptive image encryption scheme based on bit-level permutation. 59:1-59:5 - Pan Cai, Xin Li, Xiangfu Meng, Zhiguang Chu:

Influence constraint based Top-k spatial keyword preference query. 60:1-60:6 - Xuantao Zhang, Chuanbo Zhang, Weiyan Li, Donglin Wang, Chenfei Qu:

Research on energy consumption mode of green culture complex based on data mining technology. 61:1-61:5 - Himat Shah

, Mohammad Rezaei, Pasi Fränti:
DOM-based keyword extraction from web pages. 62:1-62:6 - Aliaksandr Hubin:

An adaptive simulated annealing EM algorithm for inference on non-homogeneous hidden Markov models. 63:1-63:9 - Man Liu, Shuangliang Tian, Qing Yang, Langwangqing Suo:

Merrifield-simmons indices of some product graphs. 64:1-64:5 - Lihua Zhou, Juanjuan Li, Kangkang Ding:

Research on variable lane control method based on traffic priority. 65:1-65:7 - Longmao Hu, Bingwu Fang, Xuegang Hu:

Appraisal expression extraction based on semantic and dependency parsing. 66:1-66:8 - Cheng-Li Fan, Qiang Fu, Yafei Song, Peng Ni, Bo Zhang:

Near space defense operation modeling and realization of multi-sensor autonomous cooperative scheduling. 67:1-67:7 - Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:

Enhanced blockchain based key management scheme against key exposure attack. 68:1-68:6 - Kai Wang, Yingjian Yan, Chunsheng Zhu

:
Exploiting wavelet transform and support vector machine algorithm to perform side channel attacks on advanced encryption standard (AES). 69:1-69:7 - Wenan Tan, Zihui Jiang:

A novel experience-based incentive mechanism for mobile crowdsensing system. 70:1-70:6 - Shudan Yu, Xuan Lan, Shi Xie, Longfu Chen, Wu Tan, Xiaobo Liu:

Research on data center of high-speed railway 6C system based on cloud computing. 71:1-71:6 - Xiang Wang, Jingxian Liu, Zhao Liu:

Experimental research on the key of marine data transmission systems. 72:1-72:5 - Zixiang Wang, Zhoubin Liu, Fengning Wang, Lu Chen, Wenli Shang:

Energy minimum encrypted data aggregation scheme for WSN in smart grid. 73:1-73:6 - Hao Sun, Tao Jiang, Yugang Dai:

Sentiment analysis of commodity reviews based on multilayer LSTM network. 74:1-74:5 - Haijuan Gao, Liting Hao, Guofang Ren, Jiayi Liu, Shuang Song, Yingbin Hou:

Technical development and IT application trends of medical ultrasound instrument. 75:1-75:5 - Jiayu Liu, Yongsheng Wang, Aidong Liu:

DDS based real-time image monitoring distributed system. 76:1-76:5 - Ming Xu, Yuhong Li, Qinbo Xu:

Sea trial of a real-time submerged buoy communication system based on wireless networking. 77:1-77:5 - Delong Cui

, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng, Yiheng Yuan:
Research on collaborative adaptive scheduling mechanism of cloud workflow task and virtual resources. 78:1-78:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














