default search action
CSAI/ICIMT 2018: Shenzhen, China
- Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, CSAI 2018, the 10th International Conference on Information and Multimedia Technology, ICIMT 2018, Shenzhen, China, December 08-10, 2018. ACM 2018, ISBN 978-1-4503-6606-9
Machine Learning
- Xiaofeng Liu:
Experimental Study of Chinese POS Tagging. 1-5 - Yong Jiang, Chunyang Li, Nan Li, Tao Feng, Meilian Liu:
HAASD: A dataset of Household Appliances Abnormal Sound Detection. 6-10 - Zhen Yang, Wanpeng Zhang, Hongfu Liu:
Artificial Intelligence Techniques on Real-time Strategy Games. 11-21 - Andrew Hoblitzell, Meghna Babbar-Sebens, Snehasis Mukhopadhyay:
Machine Learning with Small Data for User Modeling of Watershed Stakeholders Engaged in Interactive Optimization. 22-27 - Tao Wu, Yong Jiang, Nan Li, Tao Feng:
An Indoor Sound Source Localization Dataset for Machine Learning. 28-32 - Ming Zhan, Ruibo Tu, Qin Yu:
Understanding Readers: Conducting Sentiment Analysis of Instagram Captions. 33-40 - Haijing Tang, Jing Zhao, Xu Yang:
Explore Machine Learning for Analysis and Prediction of Lung Cancer Related Risk Factors. 41-45
Neural Network and Algorithm
- Jichao Li, Haobin Shi, Xinru Li, Meng Xu:
A Layered After-sale Quality Evaluation Model Based on Improved Artificial Neural Network. 46-51 - Mengjie Bai, Jiarui Sun, Kaili Cheng, Jingting Luo, Yong Zhao:
A Convolutional Neural Network Combined with Color Deconvolution for Mitosis Detection. 52-57 - Jiarun Cao, Chongwen Wang:
Social Media Text Generation Based on Neural Network Model. 58-61 - Jun Ou, Yujian Li:
Two-Dimensional Perceptrons. 62-66 - Zhenye Gan, Xiaotian Xing, Hongwu Yang, Guangying Zhao:
Mandarin-Tibetan Cross-Lingual Voice Conversion System Based on Deep Neural Network. 67-71 - Jiayu Liu, Wei Pan, RuoPeng Qu, Meng Xu:
Research on the Application of PID Control with Neural Network and Parameter Adjustment Method of PID Controller. 72-76 - Lei Sun, Yuehan Wang, Leyu Dai:
Convolutional Neural Network Protection Method of Lenet-5-Like Structure. 77-80 - Yalei Ding, Yuqing Zhai:
Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks. 81-85 - Dongzhi Cao, Xinglan Zhang, Zhenhu Ning, Jianfeng Zhao, Fei Xue, Yongli Yang:
An Efficient Malicious Code Detection System Based on Convolutional Neural Networks. 86-89 - Tawansongsang Karnkawinpong, Yachai Limpiyakorn:
Chest X-Ray Analysis of Tuberculosis by Convolutional Neural Networks with Affine Transforms. 90-93 - Jingting Luo, Canmiao Fu, Mengjie Bai, Yong Zhao:
Atrial Fibrillation Detection with Convolutional Neural Network. 94-98 - Mingbo Hong, Mantao Wang, Lixin Luo, Xuefeng Tan, Dejun Zhang, Yike Lao:
Combining Gated Recurrent Unit and Attention Pooling for Sentimental Classification. 99-104
Data Science and Big Data Technology
- Bin Yu, Chen Zhang, Jiangyan Sun, Yu Zhang:
Massive GIS Spatio-temporal Data Storage Method in Cloud Environment. 105-109 - Fuzong Wang, Helin Guo, Jian Zhao:
Dynamic Data Compression Algorithm Selection for Big Data Processing on Local File System. 110-114 - Tao Jiang, Bin Zhang, Jun Yang:
Efficient Processing of Reverse Top-k Dominating Queries. 115-119 - Kwan-Hua Sim, Kwan Yong Sim, Nicholas Bong:
Dynamic Time Interval Data Representation in Scalable Financial Time Series Pattern Recognition. 120-125 - Zhenggui Xiang:
How Deep Is Optimal for Learning Locally on Smartphone. 126-130 - Alexey Samoylov, Nikolay Sergeev, Margarita Kucherova, Boris Denisov:
Methodology of Big Data Integration from A Priori Unknown Heterogeneous Data Sources. 131-135 - Peilun Wu, Jianyang Liu, Fayu Wang:
Method for Establishing Handwritten Character Data Set of Traditional Chinese Medicine Prescription. 136-139 - Peicong Luo, Xiaoying Wang, Hailong Jin, Yuling Li, Xuejiao Yang:
Load Management for Multiple Datacenters towards Demand Response in the Smart Grid Integrating Renewable Energy. 140-144
Software Design and Testing
- Jingxu Xiao, Zi-cong Lu, Qi-han Xu:
A New Android Malicious Application Detection Method Using Feature Importance Score. 145-150 - Nurbojatmiko, Eko Kuswardono Budiardjo, Wahyu Catur Wibowo:
Slr on Identification & Classification of Non-Functional Requirements Attributes, and Its Representation in Functional Requirements. 151-157 - Hisham Elzain, Wu Yang:
QoS-aware Topology Discovery in Decentralized Software Defined Wireless Mesh Network (D-SDWMN) Architecture. 158-162 - Zhen-Yu Ma, Wei Zhang, Jian-Ping Wang, Fu-Sheng Liu, Kun Han, Fei Gao:
Research on a Method of Software Reliability Prediction Model. 163-167 - Xi Luo, Liming Wang, Zhen Xu, Kai Chen, Jing Yang, Tian Tian:
A Large Scale Analysis of DNS Water Torture Attack. 168-173 - Muhamad Hasbi, Eko Kuswardono Budiardjo, Wahyu Catur Wibowo:
Reverse Engineering in Software Product Line - A Systematic Literature Review. 174-179 - Chen Zhang, Xinyi Niu, Bin Yu:
A Method of Automatic Code Generation Based on AADL Model. 180-184 - Chunyu Yang, Yan Liu, Jia Yu:
Exploring Violations of Programming Styles: Insights from Open Source Projects. 185-189 - Yiming Xiao, Liang Xiao, Zhu Li:
Framework Research on the Implementation of Automated Test User Requirements. 190-194 - Yonggen Gu, Jiashen Chen, Xiaohong Wu:
An Implement of Smart Contract Based Decentralized Online Crowdsourcing Mechanism. 195-199
Intelligent Algorithms and High Performance Computing
- Jie Chen, Sheng Cheng, Meng Xu:
An Overview and Practical Application of Biological Intelligence Algorithm Used in Intelligence Control. 200-206 - Yang Zhang, Chao Li, Chuqing Cao, Yunfeng Gao:
An Improved ORB Feature Point Matching Algorithm. 207-211 - Junying Shang, Kan Li:
Dynamic Update Upper Bounds Influence Maximization Algorithm. 212-217 - Luo Liang, Ruichun Tang:
An Improved Collaborative Filtering Algorithm Based on Node2vec. 218-222 - Nanfeng Jiang, Li Guo, Gongde Guo:
Target Tracking based on Kernel Correlative Filters and SIFT features - A Self-Adaptive Scale Algorithm. 223-226 - Jin Ning, Leiting Chen, Junwei Chen:
Relative Density-Based Outlier Detection Algorithm. 227-231 - Zehua Zhao, Yan Ma, Qun Cong:
GDSF-Based Low Access Latency Web Proxy Caching Replacement Algorithm. 232-236 - Gang Lin, Lixiao Zheng, Yuanyang Wang:
An Algorithm for Learning Regular Expressions Based on Repeated String Detection. 237-241 - Rolly Intan, Siana Halim, Lily Puspa Dewi:
Fuzzy Granularity in the Knowledge-based Dynamic Fuzzy Sets. 242-246 - Delfina Malandrino, Rocco Zaccagnino, Rosalba Zizza:
A Multi-objective Optimization Model for Music Styles. 247-251 - Yao Wang, Wei Pan, An Liu, Meng Xu:
A Method of Multi-attribute Group Decision-making Based on Nearness of Triangular Fuzzy Numbers. 252-257
Pattern Recognition
- Ming Gu, Kun Hao, Zhiyi Qu:
Flag Detection with Convolutional Network. 258-262 - Xiao Zhang, Zheng Qin, Yongqiang Lyu:
Biometric Authentication via Finger Photoplethysmogram. 263-267 - Weiming Liu, Bin Yu, Chen Zhang, Han Wang, Ke Pan:
Chinese Named Entity Recognition Based on Rules and Conditional Random Field. 268-272 - Yulin Wu, Mingyan Jiang:
Multi-layer CNN Features Fusion and Classifier Optimization for Face Recognition. 273-276 - Wencan Zhong, Alex Noel Joseph Raj, Palaiahnakote Shivakumara, Zhemin Zhuang, Tong Lu, Umapada Pal:
A New Shadow Detection and Depth Removal Method for 3D Text Recognition in Scene Images. 277-281 - Guo Xianjing, Yong Li:
Text Implication Recognition Learning with Gated Recurrent Unit. 282-285 - Wuhao Zhang, Lizhuang Ma, Yanhao Ge:
Raftnet: Extract Task-aware Features for Pedestrian Attribute Recognition. 286-290
Computer Vision and Visualization
- Zhuoyue Yang, Dianxi Shi:
Mapping Technology in Visual SLAM: A Review. 291-295 - Qiangrong Yang, Jianyao Hu:
The Ceprei-Scape Dataset for the Validation of Autonomous Driving. 296-299 - Xun Chen, Siwei Xia, Hu Lu:
Failure Discrimination Mechanism Joint Blocking Training for Target Tracking. 300-304 - Hao Chen, Peng Wu, Juan Meng:
Video Detection System of Traffic Flow toward Urban Roads. 305-308 - Jiaohao Zhang, Qiang Zhang, Chunlei Shi:
An Unmanned Aerial Vehicle Detection Algorithm Based on Semantic Segmentation and Visual Attention Mechanism. 309-313 - Xiaolong Liu, Zehui Wu, Qiang Wei:
An Improved Offline Symbolic Execution Approach. 314-320
Image Processing and Application
- Chaitanya Sethi, Harsh Dabas, Chirag Dua, Mohit Dalawat, Divyashikha Sethia:
EEG-Based Attention Feedback to Improve Focus in E-Learning. 321-326 - Kun Liu, Nana Luo, Yafei Ren:
A Contrast Pre-adjusted Defect Detection of Strip Steel Surface by Total Variation-based Image Decomposition. 327-333 - Huihui Xu, Mingyan Jiang:
Non-Parametric Learning-based Depth Estimation from a Single Image in the Fourier Domain. 334-338 - Yongkai Ye, Xinwang Liu, Jianping Yin:
Multi-view Clustering with Noisy Views. 339-344 - Hanfei Xu, Yangang Cai, Ronggang Wang:
Depth Estimation in Multi-View Stereo Based on Image Pyramid. 345-349 - Sanghyun Seo, Juntae Kim:
Image-Text Embedding with Hierarchical Knowledge for Cross-Modal Retrieval. 350-353 - Shaohan Chen, Shu Wang:
Deep Learning Based Non-rigid Device Tracking in Ultrasound Image. 354-358 - Yaopu Zhao, Yanchao Yu, Ying Li:
Research on Construction Technology of 3D Scene Point Cloud Model Based on Improved PMVS Algorithm. 359-363 - Ming Chen, Xudong Zhao:
Fatty Liver Disease Prediction Based on Multi-Layer Random Forest Model. 364-368 - YaoHua Yang, Shiqing Zhang, Li Shen:
Control Divergence Optimization through Partial Warp Regrouping in GPGPUs. 369-374 - Xiaoyan Xu, Xiaofeng Song, Rongcai Zhao:
Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography. 375-379
Signal Processing
- Harsh Dabas, Chaitanya Sethi, Chirag Dua, Mohit Dalawat, Divyashikha Sethia:
Emotion Classification Using EEG Signals. 380-384 - Hao Wu, Qingzeng Song, Guanghao Jin:
Deep Learning based Framework for Underwater Acoustic Signal Recognition and Classification. 385-388 - Xiaorong Feng, Qingsong Ai, Wei Meng:
KUKA Real-Time Control through Angle Estimation of Wrist from sEMG with Support Vector Regression. 389-393 - Liying Zhao, Qiuyan Wang, Xin Dang:
Recognition Influence of Different Acousitc Characters between Male and Female Speakers. 394-398
Modern Information Theory and Technology
- Zi-Xuan Zhang, Wen-ning Hao, Gang Chen, Jun-Yue Chen, You-Wei Xu:
An Extension of MIC for Multivariate Correlation Analysis Based on Interaction Information. 399-403 - Zhe Wang:
Teamworking Strategies of Scrum Team: A Multi-Agent based Simulation. 404-408 - Chen Huang, Gongshen Liu:
Sentiment Analysis of Network Comments Based on GCNN. 409-413 - Zhenyu Pan, Jie Xue, Yang Gao, Honghao Wang, Guanling Chen:
Revealing the Relations between Learning Behaviors and Examination Scores via a Prediction System. 414-419 - Huanhuan Yuan, Yongli Wang, Xia Feng, Shurong Sun:
Sentiment Analysis Based on Weighted Word2vec and Att-LSTM. 420-424 - Daozhen Min, Lei Huang:
Research on Recommendation Methods Based on Sentiment Analysis and BTM Topic Modeling. 425-430 - Zeyuan Li, Jie He, Dagang Chen, Xin Fang, Yajun Song, Zesong Li:
A Hybrid Approach for Measuring Similarity between Government Documents of China. 431-435 - Adam L. Miller:
Video Editing Stepping Stones: Using Podcasts and Music Videos to Introduce Editing Techniques to Film Studies Students. 436-440 - Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang:
Digital Cardan Grille: A Modern Approach for Information Hiding. 441-446 - Chengfei Li, Li Liu, Fan Jiang:
Intelligent Question Answering Model Based on CN-BiLSTM. 447-450 - Hadi Sutopo, Ferryal Abadi:
Mobile Multimedia-Based Tourism Promotion Development. 451-454 - D. A. Volzhaninov, O. N. Lookin, I. N. Antsygin, A. D. Khokhlova:
Design and Programming of the Micromanipulator Network to Study Single Cardiac Cell Mechanics. 455-458
Computer Network and Communication Engineering
- Yanzong Guo, Wangpeng He, Juanjuan Zhu, Cheng Li:
A Light Autoencoder Networks for Face Swapping. 459-462 - Jae-Hong Kim, Yang-Seo Choi, Jung-Chan Na:
Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems. 463-467 - Shiqiang Zhang, Zhenhu Ning, Yang Cao:
Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs. 468-473 - Ruining Chen, Guoao Sun:
A Survey of Kernel-Bypass Techniques in Network Stack. 474-477 - Lijun Zhou, Hongyun Li, Jianlin Zhang:
Multi-feature fusion Siamese Network for Real-Time Object Tracking. 478-481 - Ying Li, Siya Xu, Wei Deng, Xiangyu Kong, Xujing Peng, Weichun Ge:
A Cost and Load Balancing based FiWi Network ONU Planning Method for Multimedia Services. 482-486 - Bahaa Hussein Taher, Lu Hong Wei, Ali A. Yassin:
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function. 487-494 - Wei Mao, Zhen Shen, Xiaolong Huang:
Facilitating Network Functions Virtualization by Exploring Locality in Network Traffic: A Proposal. 495-499 - Ling Zou, Jing Li:
An Implicit Smart Interaction Orienting to the Context Semantics of Mobile Device. 500-505
Computer Science and Engineering
- Sijia Li, Hongan Zhao, Xinyang Liu:
Virtual Mining Simulation of Cultural Relics Based on Virtual Reality. 506-510 - Jiashu Liu, Guang Chen, Jun Guo:
SENet for Weakly-Supervised Relation Extraction. 511-515 - Rui Yao, Yang Cao, Zhiming Ding, Limin Guo:
A Sensitive Words Filtering Model Based on Web Text Features. 516-520 - Feng Jiang, Zhenghao Zhang, Ping Chen, Yongrui Liu:
Naive Bayes Text Categorization Algorithm Based on TF-IDF Attribute Weighting. 521-525 - Shaohua Wang, Zhengqing Jiang:
Research on the Influencing Factors of Experience Comfort of Virtual Experiential Amusement Products. 526-529 - Dan Li, Liming Wang:
Detecting Chinese Domain Name Piracy. 530-535 - Junrong Ze, Hanxu Hou, Yunghsiang S. Han:
Comparison on Binary MDS Array Codes for Single Disk Failure Recovery. 536-541 - Xiaoyan Xu, Linna Fan, Rongcai Zhao:
Steganalysis of Content-Adaptive JPEG Steganography Based on CNN and 2D Gabor Filters. 542-547 - Yue Zhou, Yang Ji, Chujie Tian:
A Prediction Model of Wechat Official Account's Article Reading Volume. 548-555 - Pisut Oncharoen, Peerapon Vateekul:
Deep Learning Using Risk-Reward Function for Stock Market Prediction. 556-561
Modern Electronic Technology and Intelligent Control System
- Chun-Yi Lee, Tsai-Ling Kao, Ko-Shyang Wang:
Implementation of a Robotic Arm with 3D Vision for Shoes Glue Spraying System. 562-565 - Fan Yang, Ping Wang, Xinhong Wang:
Continuous Control in Car Simulator with Deep Reinforcement Learning. 566-570 - Zhenyu Wang, Xiangzhong Luo, Zheng Gong:
Application of Deep Learning in Analog Circuit Sizing. 571-575 - Bingnan Song, Dianxi Shi, Huiying Wang:
A Sensor Group Selection Mechanism Based on RGB Channels Scenario Sensing Method. 576-582 - Yongxing Teng, Ye Li, Hao Ji, Gang Li:
A Global Constrained Optimization Method for Designing Power Grid with Small Diameters. 583-588 - Baoding Xu, Ruichun Hou, Xiangqian Ding, Ye Tao:
Residential Electric Load Forecasting Method Based on Mutual Information and BP Network Combination Model. 589-593 - Zhenshen Qu, Jianxiong Shen, Ruikun Li, Junyu Liu, Qiuyu Guan:
PartsNet: A Unified Deep Network for Automotive Engine Precision Parts Defect Detection. 594-599 - Chenyu Xu, Ning Han, Hongxin Li:
A Dangerous Goods Detection Approach Based on YOLOv3. 600-603 - Yuqi Chen, Fuqiang Liu, Ping Wang, Chao Wang, Jia Hu:
Development of a Cooperative Automated Driving System via LTE-V. 604-608 - Bingfei Dai, Jianping Li, Weidong Li:
Semi-online Hierarchical Scheduling for Bag-of-tasks on Two Machines. 609-614 - Yujian Wu, Lei Huang:
Design of Dynamic Surveillance System for Port Bulk Cargo Entering and Leaving the Warehouse Based on RFID Technology. 615-619 - Yingxin Xu, Lei Sun, Songhui Guo, Shuai Li, Zewu Wang:
Research and Design of Reconfigurable Security Resource Pool Framework. 620-626
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.