default search action
AIIPCC 2019: Sanya, China
- João Manuel R. S. Tavares, Zeshui Xu:
Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing, AIIPCC 2019, Sanya, China, December 19-21, 2019. ACM 2019, ISBN 978-1-4503-7633-4 - Wentao Wang, Canhui Liao, Quan Cheng, Pengju Wang:
Mixed convolutional recurrent neural networks: learning for signal classification. 1:1-1:6 - Tao Yang, Hongli Deng:
Intelligent sentence completion based on global context dependent recurrent neural network language model. 2:1-2:5 - Yoojeong Song, Jongwoo Lee:
Design of stock price prediction model with various configuration of input features. 3:1-3:5 - Yun Ge, Guodong Jing:
Infrared and visible image fusion using multi-resolution convolution neural network. 4:1-4:5 - Xuan Zheng, Bo Fu, Xilin Zhao, Yi Quan, Zhenyu Lin, Meng Gong:
Denoising algorithm based on bilateral filtering and improved wavelet threshold function. 5:1-5:5 - Dongdong Zhang, Dong Cao, Haibo Chen:
Deep learning decoding of mental state in non-invasive brain computer interface. 6:1-6:5 - Qiang Chen, Shaoyu Wang, Lirong Yi, Wenting Shu, Rui Wang, Jue Chen:
Traffic signs recognition using dynamic-scale CNN. 7:1-7:5 - Ahmet Göncü:
Prediction of exchange rates with machine learning. 8:1-8:5 - Peng Wang, Cui Ni, Kefeng Li:
Vision-based highway traffic accident detection. 9:1-9:5 - Yuwei Pang, Dong Hu, Min Sun:
A modified scheme for liver tumor segmentation based on cascaded FCNs. 10:1-10:6 - Xingxu Cai, Yi'an Liu, Ying Xiao:
Bridge displacement prediction method based on ARIMA model. 11:1-11:6 - Jiafei Niu, Peiqing Niu:
An intelligent automatic valuation system for real estate based on machine learning. 12:1-12:6 - Wen Liu, Yaokai Mo, Jichao Jiao:
An efficient edge-feature constraint visual SLAM. 13:1-13:7 - Wei Zhang, Jiaojie Li, Xuyi Qiu:
SAR image super-resolution using deep residual SqueezeNet. 14:1-14:5 - Chunyan Liu, Xiaohong Qian:
Health assessment of EMU based on convolutional neural network. 15:1-15:5 - Hongjie Yu, Yuchen Zhao:
Chaotic synchronization of composite H-R networks. 16:1-16:5 - Lina Yang, Ying Yang, Huanhuan Yu, Guichun Zhu:
Anonymous market product classification based on deep learning. 17:1-17:5 - Baoshan Zhang, Lin Zhang, Xuan Wang, Bo Zhang, Bo Li, Peigeng Li:
Fault diagnosis model of deep belief networks based on adaptive genetic algorithm optimization. 18:1-18:6 - Lu Han, Xianjun Shi, Jiapeng Lv, Yuyao Zhai, Houjun Liu, Taoyu Wang:
Lithium-ion battery capacity prediction based on grey neural network model. 19:1-19:6 - Igor Bikeev, Pavel Kabanov, Ildar Begishev, Zarina Khisamova:
Criminological risks and legal aspects of artificial intelligence implementation. 20:1-20:7 - Alexander A. Potapov, Wei Zhang, Tianhua Feng, Sergo Rekhviashvili:
Sigma-pi neural unit: switching circuit simulation. 21:1-21:5 - Guangliang Zhou, Changhui Hu, Xiaoyuan Jing, Jian Yu, Shen Jing:
The face recognition based on ensemble method. 22:1-22:5 - Lihua Zhou, Juanjuan Li, Suping Fang:
A look-ahead micro-segment smoothing algorithm based on improved S-curve acceleration and deceleration. 23:1-23:5 - Pius Kwao Gadosey, Yujian Li, Peter T. Yamak:
On pruned, quantized and compact CNN architectures for vision applications: an empirical study. 24:1-24:8 - Lei Peng, Wenzhong Qu, Yan Zhao, Yunkun Wu:
A multi-level network for radio signal modulation classification. 25:1-25:5 - Xi Fang, Xin Sui, Yixin Fu, Junying Mao, Ding Ding, Ronglei Hu, Yuchao Wang, Zhufeng Suo, Yueyang Yu:
K-means-based channel equalization method for polarization-division-multiplexed optical OFDM/OQAM systems. 26:1-26:5 - Yuan Jiang, Jianwei Li:
Feature reusing and semantic aggregation for single stage object detector. 27:1-27:6 - Jinyong Yin, Jian Yang, Hongbin Yang, Zexing Du:
A CNN accelerator on embedded FPGA using dynamic reconfigurable coprocessor. 28:1-28:5 - Yang Yang, Fei Lin, Dingguo Yu, Jiefang Zhang, Chen Yang, Qiang Lin:
A traffic flow hierarchy induction algorithm based on VANET. 29:1-29:6 - Yushi Liu, Zhen Tian, Karin Yanagi, Lixin Liu, Chengcai Lv:
Carcinogenicity prediction by in vitro human liver cell gene expression and chemical structure. 30:1-30:9 - Guanghui Xu, Qingsong Zhang, Na Li, Lecheng Ouyang, Tong Zhao, Qihuan Chen:
Closed-loop detection and repositioning method based on bag of word. 31:1-31:7 - Dong Cao, Lisha Xu, Dongdong Zhang:
Cross-enhancement transform two-stream 3D ConvNets for action recognition. 32:1-32:5 - Ali Mohsin, Qingsong Niu, Xinyu Wang, Min Shao, Haixiu Zhang, Shouwang Zhang, Xiaoming Zhang:
Application of bean optimization algorithm in ranking model for Dangshan pear germplasm resources nature reserve based on fuzzy preference relationships. 33:1-33:6 - Yin Long, Changhua Liu:
Research on deep learning method of crop disease identification. 34:1-34:6 - Bin Zhang, Haibin Xia, Hun-ok Lim:
Development of an AI based teaching assisting system. 35:1-35:5 - Wenxing Zhang, Pengfei Zhao, Jianguo Wang, Wenjing Liu:
A gear fault diagnosis method based on manifold semi-supervised K-means clustering algorithm. 36:1-36:5 - Jiawei Yang, Susanto Rahardja, Pasi Fränti:
Outlier detection: how to threshold outlier scores? 37:1-37:6 - Yang Liu, Shiqing Zou, Xianguo Wu, Jiaying Teng:
Research on selection of exterior window of residence building based on numerical simulation. 38:1-38:6 - Jici Xing, Guoying Liu, Jing Xiong:
Oracle bone inscription detection: a survey of Oracle bone inscription detection based on deep learning algorithm. 39:1-39:8 - He Liu, Xiaohui Wang, Shuya Lei, Xi Zhang, Weiwei Liu, Ming Qin:
A rule based data quality assessment architecture and application for electrical data. 40:1-40:6 - Wenkai Wang, Liang Chang, Chenzhong Bin, Wen Xuan, Wei Chen, Long Li:
ESN-NER: entity storage network using attention mechanism for chinese NER. 41:1-41:8 - Yan Wang:
Decision-making model based on set pair analysis and optimal combination weight for schemes of eco-type revetment. 42:1-42:5 - Shuan Yan, Hongyong Yuan, Yan Gao, Boao Jin, Yifan Ma, Lizheng Deng:
Experimental investigation on detection and location of leakage in buried water-filled pipelines under different types of sensor arrays and soils. 43:1-43:8 - Xianyi Cheng, Guohua Ji, Xiaohua Zhang, Fengmei Chen:
The semantic tagging model of chinese question sentence chunk based on description logics. 44:1-44:6 - Wei Lu, Bin Deng, Wei Zhang, Jingjing Wang, Liang Zhong, Shixin Peng:
Channel feedback based on complex 1-bit Bayesian compressed sensing in FDD massive MIMO systems. 45:1-45:6 - Yong Hou, Yan Feng, Jie Hao:
Two-dimensional DOA estimation algorithm based on time-frequency point selection. 46:1-46:5 - Yi Zhao, Xin Chen, Junxiang Wang:
A survey of reversible data hiding based on HEVC video compression format. 47:1-47:9 - Fengsui Wang, Furong Liu, Shuming Zhu, Linjun Fu, Zhengnan Liu, Qisheng Wang:
HEVC intra frame based compressed domain video summarization. 48:1-48:7 - Xinfeng Ye, Sathiamoorthy Manoharan:
Providing automated grading and personalized feedback. 49:1-49:5 - Caiping Li, Lei Chang, Jisheng Zhang, Xiaoming Zhou, Zhen Hu, Yuanchen Song:
Adaptive recommendation technology for remote sensing information based on behavior analysis. 50:1-50:5 - Licheng Li, Chenlu Qiu, Aifen Fang:
Detection of test cheating by outlier analysis approach using probability estimation. 51:1-51:5 - Lan Lin, Yuchao Wu, Xuetao Wu, Shuicai Wu:
APOE-ε4 allele load modifies the brain aging process in cognitively normal late middle aged and older adults. 52:1-52:5 - Xiaoli Guo, Qing Chen, Yin Li:
On the square-based montgomery multiplier for a class of type C.2 pentanomial. 53:1-53:5 - Mingwen Chi:
An improved wolf pack algorithm. 54:1-54:5 - Rui Cui, Jifei Pan, Jing Zhu:
Research on jamming effect evaluation method of AN/TPY-2 radar using set pair approach degree. 55:1-55:5 - Shaozheng Zhu, Jirong Xin, Wuzhong Luo, Wenqi Tang:
Analysis of the jamming method for high frequency M-dimensional orthogonal modulated signals. 56:1-56:5 - Jian Li, He Song, Xuemei Wei, Jiahui Liang:
Result analysis of Kaiman filter for unobservable systems. 57:1-57:5 - Zhengwu Wu, Feng Ding, Xu Yan, Shusen Zhang, Donghao Yang, Xiaolong Mao:
An associated probability analysis model based on multi-element fusion. 58:1-58:7 - Ping Wang, Jin Qiu:
An adaptive image encryption scheme based on bit-level permutation. 59:1-59:5 - Pan Cai, Xin Li, Xiangfu Meng, Zhiguang Chu:
Influence constraint based Top-k spatial keyword preference query. 60:1-60:6 - Xuantao Zhang, Chuanbo Zhang, Weiyan Li, Donglin Wang, Chenfei Qu:
Research on energy consumption mode of green culture complex based on data mining technology. 61:1-61:5 - Himat Shah, Mohammad Rezaei, Pasi Fränti:
DOM-based keyword extraction from web pages. 62:1-62:6 - Aliaksandr Hubin:
An adaptive simulated annealing EM algorithm for inference on non-homogeneous hidden Markov models. 63:1-63:9 - Man Liu, Shuangliang Tian, Qing Yang, Langwangqing Suo:
Merrifield-simmons indices of some product graphs. 64:1-64:5 - Lihua Zhou, Juanjuan Li, Kangkang Ding:
Research on variable lane control method based on traffic priority. 65:1-65:7 - Longmao Hu, Bingwu Fang, Xuegang Hu:
Appraisal expression extraction based on semantic and dependency parsing. 66:1-66:8 - Cheng-Li Fan, Qiang Fu, Yafei Song, Peng Ni, Bo Zhang:
Near space defense operation modeling and realization of multi-sensor autonomous cooperative scheduling. 67:1-67:7 - Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:
Enhanced blockchain based key management scheme against key exposure attack. 68:1-68:6 - Kai Wang, Yingjian Yan, Chunsheng Zhu:
Exploiting wavelet transform and support vector machine algorithm to perform side channel attacks on advanced encryption standard (AES). 69:1-69:7 - Wenan Tan, Zihui Jiang:
A novel experience-based incentive mechanism for mobile crowdsensing system. 70:1-70:6 - Shudan Yu, Xuan Lan, Shi Xie, Longfu Chen, Wu Tan, Xiaobo Liu:
Research on data center of high-speed railway 6C system based on cloud computing. 71:1-71:6 - Xiang Wang, Jingxian Liu, Zhao Liu:
Experimental research on the key of marine data transmission systems. 72:1-72:5 - Zixiang Wang, Zhoubin Liu, Fengning Wang, Lu Chen, Wenli Shang:
Energy minimum encrypted data aggregation scheme for WSN in smart grid. 73:1-73:6 - Hao Sun, Tao Jiang, Yugang Dai:
Sentiment analysis of commodity reviews based on multilayer LSTM network. 74:1-74:5 - Haijuan Gao, Liting Hao, Guofang Ren, Jiayi Liu, Shuang Song, Yingbin Hou:
Technical development and IT application trends of medical ultrasound instrument. 75:1-75:5 - Jiayu Liu, Yongsheng Wang, Aidong Liu:
DDS based real-time image monitoring distributed system. 76:1-76:5 - Ming Xu, Yuhong Li, Qinbo Xu:
Sea trial of a real-time submerged buoy communication system based on wireless networking. 77:1-77:5 - Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng, Yiheng Yuan:
Research on collaborative adaptive scheduling mechanism of cloud workflow task and virtual resources. 78:1-78:6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.