default search action
DSIT 2021: Shanghai, China
- DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23 - 25, 2021. ACM 2021, ISBN 978-1-4503-9024-8
- Fuming Chen, Chuantao Li, Fulai Liang, Jianqi Wang:
A New Algorithm on 94 GHz Asymmetric Antenna Bio-radar Conducted Speech Enhancement. 1-4 - Haipeng Zhang, Ningning Lu, Jie Li, Ruiliang Song:
Time Analysis of IoT Node Based on Ambient RF Energy Harvesting for Ultra-low Power Application. 5-8 - Haixia Li, Li Yan:
A Temporal RDF Model for Multi-grained Time Information Modeling. 9-14 - Jia-Tao Huang, Hong-Liang Sun, Xiao-Fei Chen, Xiao-lin Liu, Jie Cao:
An Iterative Deviation-based Ranking Method to Evaluate User Reputation in Online Rating Systems✱. 15-21 - Zhenni Ni, Zhizhen Yao, Yunmei Liu, Yuxing Qian:
Dynamic user needs modeling based on social support in online health communities. 22-27 - Bin Sun, Jing Xu, Wei Hong, Xiaocong Li:
A novel detection algorithm for radar signal under non-Gaussian clutter. 28-31 - Wei Ge, Xin Luo, Ran Tao, Youqun Shi:
Human Fall Detection Algorithm Based on Mixed Attention Mechanism. 32-37 - Zheng Song, Jianguo Yu, Yue He, Jikai He:
Leaky Training: A Robustness Improvement Scheme for Autoencoder Based Network Intrusion Detection System under Online Learning. 38-43 - Beini Jia, Xin Luo, Ran Tao, Youqun Shi:
Surface Defect Detection of Aluminum Material Based on HRNet Feature Extraction. 44-48 - Yu Fan, Chin-Ta Chen, Chih-Chung Yang:
Cantonese speaker recognition system based on EM algorithm in noisy environments. 49-54 - Jian-hua Li, Chenxi Zhang, Chun-li Lei, Hong Zhang, Lin-long Chen:
Product Recommendation Algorithm for Score Prediction Based on Joint Feature Vector Extraction. 55-61 - Haiwen Wei, Na Liu, Qian Zhang, Chuanfeng Yang, Junjian Guo, Shuo Wang:
Research on 3D Visualization technology of Dual-polarization Weather Radar Products. 62-68 - Yiming Fei, Xiaoyue Yuan, Mengmeng Ren, Shuhai Fan:
Research on Horizontal Integration Scheme for Mass Customization Data Quantity and Quality Problem: Horizontal Integration Scheme for MC. 69-73 - Xin Pan, Bing Zhu, Yanbing Liu, Feijie Huang:
A LSTM-cBiGAN based hybrid sampling method for time series customer classification. 74-77 - Zhu Fu, Weike Ding, Peng Guan, Xuhui Ding:
Topic Mining of Modern Poetry For Digital Humanities: Case Study of Gu Cheng Poetry. 78-83 - Peng Liu, Liang Gui:
Structural Analysis of Collaboration Network in OSS Communities∗. 84-91 - Qiuyun Cheng, Guozheng Yang, Jingju Liu, Yongheng Zhang:
Research on Network Security Issues from the Perspective of Multilayer Networks. 92-97 - Bin Lu, Lijuan Zhou, Shudong Zhang, Xin Chen, Weidong Feng:
Detection of small objects in complex long-distance scenes based on Yolov3. 98-102 - Zichen Zhang, Yong Shao, Yuliang Shi, Changshun Yan:
Research on Traffic Data Resource Sharing Model Based on Blockchain. 103-108 - Pilita A. Amahan, Mia V. Villarica, Albert A. Vinluan:
Technical Analysis of Twitter Data in Preparation of Prediction using Multilayer Perceptron Algorithm. 109-113 - Pilita A. Amahan, Mia V. Villarica, Albert A. Vinluan:
Analysis of Membership Function in the Implementation of Neuro-Fuzzy System for Prediction of Depressive Lexicons. 114-118 - Chungang Gao, Yongjie Wang, Xinli Xiong:
Comparison of Defense Effectiveness between Moving Target Defense and Cyber Deception Defense. 119-124 - Qingyang Wu, Xu Cheng, Erxin Sun, Chengpeng Deng:
Collaborative filtering algorithm based on optimized clustering and fusion of user attribute features. 125-129 - Chang Su, Yining Gang, Chengming Jin:
Genetic Algorithm based Edge Computing Scheduling Strategy. 130-134 - Qing Hu, Wenshuo Han, Hao Zhang:
Ship identity authentication security model based on Blockchain. 135-142 - Zanyu Hou, Xinting Cui, Qiushuang Shi:
Prediction of Steel Production Based on the Combination of XGBOOST and LassoLars. 143-147 - Guangjie Li, Jiajun Ma, Qiang Zhan, Dandan Wu, Xiong Wei, Xu Wang, Jiancun Zuo:
Detection Technology of Satellite Navigation Spoofing Signal. 148-153 - Tilei Gao, Jinyu He, Tengyang Fan, Feng Ma:
Research on dynamic evolution method of software service based on trusted agent. 154-158 - Zhe Wang, Kangfeng Zheng, Qingbiao Li, Maonan Wang, Xiujuan Wang:
Adversarial Text Generation for Personality Privacy Protection. 159-165 - Feng Ma, Ying Yang, Tilei Gao:
A new method of similarity measure for Vague Sets. 166-169 - Quang-Vinh Dang, Thai-Ha Pham, My-Linh Tran, Minh-Hung Dang, Quoc-Khanh Nguyen, Anh-Nguyen Nguyen:
Towards an automatic interior design system using GAN. 170-172 - Zhong Zheng, Guixia Kang:
Model Compression with NAS and Knowledge Distillation for Medical Image Segmentation. 173-176 - Yaoduo Zhang:
Sa-HarDNeSt: A Self-Attention Network for Polyp Segmentation. 177-182 - Jiting Li, Yu Cheng, Tao Wang, Hao Wang:
PLEAS: A Decision Support System for Personnel Evaluation and Selection. 183-190 - Haoyuan Zheng, Yonghui Zhang, Daxiang Huang:
Load Balancing RPL Routing Protocol Based on Non-uniform Clustering. 191-195 - Jiajun Ma, Guangjie Li, Qiang Zhan, Dandan Wu, Xiong Wei, Xu Wang, Qiang Zhao, Jiancun Zuo:
Surface roughness detection based on image analysis. 196-200 - Rabranea Bqa, Samia Asloob Qureshi, Tanzeela Shakeel, Ateeqa Naseer:
Reverse Engineering on Planar Contours: An Algorithmic Review. 201-207 - Li Wang, Taijun Li:
Research on Image Feature Extraction Method Fusing HOG and Canny Algorithm. 208-211 - Dandan Wu, Yue Peng, Qiang Zhan, Jiajun Ma, Guangjie Li, Xiong Wei, Xu Wang, Jiancun Zuo:
Text recognition technology for natural scenes. 212-217 - Wendian Zhao, Yongjie Wang, Xinli Xiong, Mingzhi Wang:
DSCT: A Damage Strategy for Inter-domain Routing System Considering Cost and Based on TOPSIS. 218-225 - Shigeo Akashi, Yao Tong:
A Vulnerability of Dynamic Network Address Translation to Denial-of-Service Attacks. 226-230 - Shudong Li, Xi Kang, Yankun Feng, Gang Liu:
Detection method for individual pig based on improved YOLOv4 Convolutional Neural Network. 231-235 - Jiajun Hu, Weijie Shang, Hanqi Lou:
Research on AGV Path Based on Optimal Planning. 236-240 - Chun-yan Nie, Hui-yu Wang, Ru-jun Fan, Xin-lei Ruan, Cheng-jin Yang, Min-shi Che:
Research and Implementation of Emotion Recognition Platform Based on Multiple Physiological Signals. 241-245 - Nirmalya Thakur, Chia Y. Han:
Pervasive Activity Logging for Indoor Localization in Smart Homes. 246-255 - Qian Cao:
Research on the development trend of China's integrated circuit industry based on patent measurement∗. 256-259 - Yan He, Longwei Sun, Xiaoping Li, Hongfei Nie:
Study on Temperature Control Model and Algorithm for the Discharge Cavity of Excimer Laser. 260-267 - Xinyuan Niu, Wenguang Zheng, Yingyuan Xiao, Qian Wang:
Short text similarity computation method based on feature expansion and Siamese network. 268-272 - Yifei Hu, Shiwei Yang, Anjie Shi:
Research on Transferable Patent Recognition Based on Machine Learning. 273-278 - Ling Xu, Song Chen, Yue Liu:
A Study to Investigate the Characteristics and Influencing Factors of the Leisure Life of Females: - - Based on Survey Data of Beijing Residents' Social Lives. 279-285 - Qin Qin, Bing Lu, Xin Wang:
NOR Flash test system based on FPGA. 286-290 - Ke Jia:
Method of Improving Semantic Representation of Word Embedding. 291-294 - Ke Jia:
Machine Learning on Mining Potential Adverse Drug Reactions for Pharmacovigilance. 295-298 - Huiying Jiang, Maode Ma:
Binary Tree-Based Interest Flooding Attack Detection and Mitigation in NDNs. 299-304 - Yongkang Zhang, Peng Cao:
A Simple Algorithm for Quickly Estimating the Sharpness of Mobile Phone Images. 305-309 - Yanhui Chen:
A study on the cognitive efficiency of visual attention in pop-up ads based on eye-movement experiments. 310-316 - Hui Wang, Yu Zhang:
Research on the design of chopsticks for dining reminders based on HSI color space recognition. 317-322 - Peng Li, Haibin Xie, Zhiyong Ding:
An evolutionary adaptive clustering algorithm. 323-327 - Zehong Zheng, Shangping Zhong, Kaizhi Chen:
Decision-making Method of Futures Trading Using Dictionary-based Early Classification of Time Series. 328-333 - Sadeq Darrab, David Broneske, Gunter Saake:
MaxRI: A method for discovering maximal rare itemsets. 334-341 - Hong-wei Wu, Hui Guan:
The mechanism of brand reputation on consumer purchase intention in live banding. 342-347 - Meijun Ning, Hui Lv, Dongxu Zhang, Luoru Ma:
Analysis of Literature Big Data on Factors Influencing Corporate Annuity Participation Decision and Its Logic in China. 348-354 - Xiaojian Li, Hailan Wang, Jiajia Zhang, Huang Liang, Fu Liao, Yiyi Jiang:
A Change-point Wavelet Method to Hard Drives Running Status. 355-360 - Wenda Ma, Hui Xie:
Research on Prediction Algorithm of Vehicle Trajectory in Front Based on Driving Intention Classification. 361-367 - Xinru Chen, Pengjun Zhai, Yu Fang:
High utility pattern mining based on historical data table over data streams. 368-376 - Fachao Li, Shijie Ma, Chenxia Jin:
Research on Data Consistency Detection Method Based on Interactive Matching. 377-382 - Junmin Jia, Fangyuan Cheng:
Feature Extraction and Classification Recognition of Electroencephalogram Signals Based on Convolutional Neural Network. 383-388 - Keyang Wang, Yiping Zeng, Fanyu Meng, Feiyu, Lili Yang:
Comparison between Calculation Methods for Semantic Text Similarity based on Siamese Networks. 389-395 - Fangyuan Cheng, Junmin Jia:
Quantitative interactive investment algorithm based on machine learning and data mining. 396-401 - Peng Wang, Jing Yang, Jianpei Zhang:
Location Prediction for Indoor Spaces based on Trajectory Similarity. 402-407 - Jun Wang, Wei Zhang, Jinghong Tian, Mingtong Liu, Shengda Zhang:
Tracking and decision of outsourcing service for auto parts. 408-413 - Hao Huang, Lihua Zhou, Yiting Jiang:
Early detection of fake news based on multiple information features. 414-419 - Biao Ning, Bing Kong, Lihua Zhou, Chongming Bao, Chongyun Wang:
Algorithm for Mining Structural Holes in Weighted Networks. 420-426 - Xianbin Hong, Sheng-Uei Guan, Prudence W. H. Wong, Nian Xue, Ka Lok Man, Dawei Liu:
Can AI Teach Humans? Humans AI Collaboration for Lifelong Machine Learning. 427-432 - Zhongming Yang, Xiaohui Lu, Lilong Huang, Jun Yu, Jianhui Yang:
Minimization of Dynamic Programming Algorithm by Three-dimension Model Collison Test Fitting. 433-437 - Manop Phankokkruad:
Ensemble Transfer Learning for Lung Cancer Detection. 438-442 - Jiajun Hu, Weijie Shang, Jian Rong:
The Shortest Path Application of the Logistics System in Production Workshop. 443-447 - Yongliang Huang, Shulin Yang, Xiang Li, Jiao Peng, Meiqi Zhou:
Research on Publisher Topic Selection Based on Data Mining. 448-452 - Nikolaos Fournogerakis, Spyridon Poulos, Athanasios Petsakos, Dimitrios Vogiatzis:
Intelligent Document Analysis in the Insurance Market. 453-457 - Ginel Dorleon, Nathalie Bricon-Souf, Imen Megdiche, Olivier Teste:
Absolute Redundancy Analysis Based on Features Selection. 458-461 - Qiang Liu, Song Yan, Jie Wan, Ruiqiang Ma, Jianhang Xu:
Multi-malicious nodes double-spending attack blacklist management model. 462-467 - Francis Fuller Bbosa, Ronald Wesonga, Peter Nabende, Josephine Nabukenya:
A Modified Decision Tree and its Application to Assess Variable Importance. 468-475 - Ruchun Cen:
Random Response and Extreme Value Response Analysis of Vortex Rod and Blade for Wire Feeder. 476-481
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.