default search action
ACAI 2020: Sanya, China
- ACAI 2020: 3rd International Conference on Algorithms, Computing and Artificial Intelligence, Sanya, China, December, 2020. ACM 2020, ISBN 978-1-4503-8811-5
- Liming Zhu, Min Zhang, Qiang Zhang:
An Intelligent Forecasting Method for Cigarette Equipment Maintenance Based on Fuzzy Mathematics Improved Analytic Hierarchy Process. 1:1-1:4 - Chuchu Yu, Xinmei Yang, Han Jiang:
Deep Factorization Machines network with Non-linear interaction for Recommender System. 2:1-2:9 - Tongtong Xie, Haiying Ye, Hongyan Wang, Jeroen van de Weijer:
The Study of Phonological Neighborhoods in Chinese L1 and L2 Speech Production. 3:1-3:6 - Qing Xia, Chun-Xu Jiang, Chuan Yang, Hao Huang:
A Semantic Demand-Service Matching Method based on OWL-S for Cloud Testing Service Platform. 4:1-4:6 - Yanghui Fu, Xingxing Liang, Yang Ma, Kuihua Huang, Yan Li:
Coordinating Multi-Agent Deep Reinforcement Learning in Wargame. 5:1-5:5 - Fulian Yin, Xiaoli Feng, Fangyuan Ju, Yanyan Wang:
Curve fitting of the user barrage emotional change based on the hybrid kernel PSO_LSSVM model. 6:1-6:7 - Jia Yuan, Jin Xie:
Deep Learning on Superpoint Generation with Iterative Clustering Network. 7:1-7:6 - Zhihong Chen, Yao Wang, Yanbo Wang, Junqin Lin, Binyan Liang, Yafang Zhang:
Multi-autonomous Robot Sorting System Using Deep Convolution Neural Network. 8:1-8:6 - Zhifeng Han, Xu Li, Jianchun Wang:
Longitudinal collision warning system based on driver braking characteristics. 9:1-9:7 - Yan Wang, Min Wang, Jia Li, Xiang Xu:
Comparison of genetic algorithm and dynamic programming solving knapsack problem. 10:1-10:5 - Cunchao Zhu, Guangquan Cheng, Yang Ma, Jiuyao Jiang, Min Wang, Tingfei Huang:
Robustness analysis of noise network link prediction. 11:1-11:7 - Jia Li, Tianci Jiao, Yan Wang:
Research on Survey Path Planning Based on mTSP Planning Model and Ant Algorithm. 12:1-12:8 - Xingjian Dai, Jin Xie, Jianjun Qian, Jian Yang:
Lane Detection Combining Details and Integrity: an Advanced Method for Lane Detection. 13:1-13:6 - Yang Ma, Guangquan Cheng, Xingxing Liang, Yuan Wang, Yuzhen Zhou:
Heterogeneous Graph Neural Networks Based on Meta-path. 14:1-14:4 - Ye Liu, Weipeng Cao, Zhong Ming, Qiang Wang, Jiyong Zhang, Zhiwu Xu:
Ensemble Neural Networks with Random Weights for Classification Problems. 15:1-15:5 - Liang Du, Haiying Zhang, Xin Ren, Xiaolin Lv:
Manifold Adaptive Multiple Kernel K-Means for Clustering. 16:1-16:7 - Min Wang, Qing Cheng, Jincai Huang, Guangquan Cheng:
Analysis of the European stock market's advance response time to COVID-19 based on Pearson correlation Coefficient. 17:1-17:7 - Hanwen Yang, Peiyu Fang, Zhiang Hao:
A GAN-based Method for Generating Finger Vein Dataset. 18:1-18:6 - Chuang Wang, Song Li, Wenfeng Wei, Shijie Li, Jiayi Liu:
A dimension reduction method of situation knowledge based on Sparse Autoencoder. 19:1-19:6 - Gang Wang, Kai Tang, Kazushige Ouchi:
F3N: Full Feature Fusion Network for Object Detection. 20:1-20:7 - Mei Wang, Xinrong Tao, Fei Han:
A New Method for Redundancy Analysis in Feature Selection. 21:1-21:5 - Xiaohui Yan, Cuiying Wen, Yan Ye, Zhicong Zhang, Shuai Li:
A Relative Position-based Bacterial Foraging Optimization for Numerical Optimization. 22:1-22:7 - Chaoshun Chang, Xiaoyong Li, Yali Gao:
A Graph Convolution model considering label co-occurrence LC_GCN. 23:1-23:6 - Shibing Zhu, Haifeng Shuai, Changqing Li, Rui Liu:
TDOA Parameter Estimation based on VMD-WTD in Satellite Interference Location. 24:1-24:8 - Yuzheng Zhu, Yaping Zhang, Qiaosheng Feng:
Colorful 3d reconstruction from a single image based on deep learning. 25:1-25:7 - Xiang Bao, Guifeng Liu, Manrong Wang:
Text Categorization by Multi-instance Multi-label and Momentum Stochastic Gradient Descent Strategy. 26:1-26:4 - Ziliang Guo, Xueming Li:
Network Slimming with Augmented Sparse Training and Optimized Pruning. 27:1-27:5 - Chao Lv, Fupo Wang, Jianhui Wang, Lei Yao, Xinkai Du:
Siamese Multiplicative LSTM for Semantic Text Similarity. 28:1-28:5 - XueYong Wu, Jie Li, Cheng Zhang, Yu Yang, YaChao Yang:
Dynamical Alignment and Estimation for Horizontal Attitude of UAV Based on Vision and IMU. 29:1-29:9 - Liufen Peng, Miaomei Chen, Jin Yang, Bohua Feng:
Research on sub healthy evaluation index selection of college students based on Delphi Methodology. 30:1-30:7 - Xi Chen, Chongwu Dong, Jinghui Qin, Long Yin, Wushao Wen:
Label-Attentive Hierarchical Network for Document Classification. 31:1-31:6 - Ran Wang, Jinglu Liu, Qijing Yu:
The Design and Development of Virtual Simulation Experiment for Online learning. 32:1-32:4 - Guangwu Cui, Ruimin Shen, Yingfeng Chen, Juan Zou, Shengxiang Yang, Changjie Fan, Jinghua Zheng:
Reinforced Evolutionary Algorithms for Game Difficulty Control. 33:1-33:7 - Rui Song, Xumin Song, Yasheng Zhang, Yanni Ma:
Experiment in Parallel Computing for the Julia Programming Language. 34:1-34:7 - Xuefeng Bai, Lijun Yan:
A Sparse Deep Linear Discriminative Analysis using Sparse Evolutionary Training. 35:1-35:4 - Weikang Zhang, Zhanzhe Li, Yupu Guo:
Leveraging Different Context for Response Generation through Topic-guided Multi-head Attention. 36:1-36:6 - Ziyang Pan, Zhishan Huang, Xiaowen Lin, Songxia Li, Huanze Zeng, Daifeng Li:
Multi-data Fusion Based Marketing Prediction of Listed Enterprise Using MS-LSTM Model. 37:1-37:10 - Zhongyun Jiang, Rongrong Wang:
Underwater Object Detection Based on Improved Single Shot MultiBox Detector. 38:1-38:7 - Yanbing Liu, Xiang Shi, Feijie Huang, Senyou Yang, Qiqi Fan, Bing Zhu:
Customer classification based on spatial transition probability and Deep Forest. 39:1-39:5 - Dequn Zhao, Liqi Wu, Guangmin Sun, Haitao Zhu, Sheng Cheng, Xinyu Qu:
Design and Research of Support System for Multiple Simulation UAVs. 40:1-40:8 - Manal El Akrouchi, Houda Benbrahim, Ismail Kassou:
Monitoring Early Warning Signs Evolution Through Time. 41:1-41:9 - Zhijian Chen, Jing Liu, Hui Chen:
Generating Adversarial Examples Based on Subarea Noise Texture for Efficient Black-Box Attacks. 42:1-42:5 - Qiangwang Shen, Meng Ding, Shuqin Li, Wentao Du, Wenlong Zhao:
Research on Jiuqi Game Strategy Based on Chess Shape. 43:1-43:5 - Feiyan Zhan:
Research on bank fraud transaction detection based on LSTM-Focalloss. 44:1-44:6 - Yiwei Hao, Dian Cai, Shuqin Li:
Research and Realization of Einstein Chess Game System and Autoplay Machine Automatic Game. 45:1-45:6 - Weiwei Wang, Xinli Xiong, Songhe Wang, Jingye Zhang:
MTDNNF: Building the Security Framework for Deep Neural Network by Moving Target Defense. 46:1 - Lihong Dong, Xinyi Wu, Jiehui Zhang:
Drill Pipe Counting Method Based on Scale Space and Siamese Network. 47:1-47:6 - Junjie Chen, Lingxiao Cheng, Enbo Cong, Chunlei Yang, Xuesi Li:
A Fault Diagnosis and Comprehensive Evaluation Methods for the Electrical System. 48:1-48:5 - Pan Luo, Chenbo Qiu, Yuhao Wang:
DAS: Deep Autoencoder with Scoring Neural Network for Anomaly Detection. 49:1-49:6 - Bingzhe Wei, Xiangchu Feng, Kun Wang, Bing Gao:
The multi-focus image fusion method based on CNN and SR. 50:1-50:4 - Jingbing Chen, Jie Yuan, Yuewei Li, Yiqi Zhang, Yufan Yang, Ruiqi Feng:
A Malicious Web Page Detection Model based on SVM Algorithm: Research on the Enhancement of SVM Efficiency by Multiple Machine Learning Algorithms. 51:1-51:7 - Zhi Bie, Lufeng Qian, Jie Ren:
Community Detection Algorithm based on Node Similarity in Signed Networks. 52:1-52:6 - Mingxue Liao, Yuanyuan Liang, Rui Wang:
The Gravitation-based Algorithm for Community Detecting in Large-scale Social Networks. 53:1-53:6 - Shihan Yang, Weiya Zhang, Rui Tang:
Fast Confidence Prediction of Uncertainty based on Knowledge Graph Embedding. 54:1-54:6 - Xia Cao, Chenggang Song, Jian Zhang, Chang Liu:
Remote Sensing Image Segmentation based on Generative Adversarial Network with Wasserstein divergence. 55:1-55:6 - Moran Ju, Haibo Luo, Zhongbo Wang:
An improved YOLO V3 for small vehicles detection in aerial images. 56:1-56:5 - Bowen Wang:
An anti-collision algorithm based on tag serial number extended grouping. 57:1-57:6 - Yongming Zhang, Chao Mao, Hanqin Li:
Study on Optimized Dispatching of Warship Equipment Maintenance Task Based on Ant Colony Algorithm. 58:1-58:4 - Ou Min, Zhang Wei, Zhou Nian, Xie Su:
An application of LSTM prediction model based on keystroke data. 59:1-59:6 - Nicolas Turenne, Bokai Xu, Xinyue Li, Xindi Xu, Hongyu Liu, Xiaolin Zhu:
Exploration of a Balanced Reference Corpus with a Wide Variety of Text Mining Tools. 60:1-60:9 - Wenlong Chen, Laixian Zhang:
The Cat's Eye Effect Target Recognition Method Based on deep convolutional neural network. 61:1-61:6 - Xinyue Yang, Haiyun Gan, Ying Yan:
AEB Test Scene Extraction and Control Simulation based on Rain or Snow Weather. 62:1-62:6 - Xiangyu Jia, Xinhai Chen, Qian Wan, Jie Liu:
A Novel Interactive Recurrent Attention Network for Emotion-Cause Pair Extraction. 63:1-63:9 - Lixuan Zhao, Jian Yang, Qinglai Qin:
Enhancing Prosodic Features by Adopting Pre-trained Language Model in Bahasa Indonesia Speech Synthesis. 64:1-64:6 - Yangyang Li:
Early Diagnosis of Alzheimer's Disease Using Hybrid Word Embedding and Linguistic Characteristics. 65:1-65:7 - Xiangeng Shen, Xiaoyang Liu, Pengfei Jiao:
Research on the application of image processing in improving the reconnaissance efficiency of UAV. 66:1-66:5 - Ping Zhu:
Natural Language Semantic Representation Method Based on the Scene Framework. 67:1-67:4 - Zhixiang Luo, Jie Zhu, Zhensong Li, Saihu Liu:
Research the Method of Joint Segmentation and POS Tagging for Tibetan using BiGRU-CRF. 68:1-68:6 - Peiying Li, Jian Yang, Feng Chen:
Analysis and Prediction of Myanmar Prosodic Unit Boundary. 69:1-69:6 - Xin Shi, Xiaoyang Zeng, Jie Wu, Mengshu Hou, Hao Zhu:
Context Event Features and Event Embedding Enhanced Event Detection. 70:1-70:6 - Lixin Xia, Yun Xia:
The Design and Construction of the Corpus of China English. 71:1-71:5 - Abhishek Desai, Prateek Nagwanshi:
Grouping news events using semantic representations of hierarchical elements of articles and named entities. 72:1-72:6 - Anbang Ye, Bo Pang, Yucheng Jin, Jiahuan Cui:
A YOLO-based Neural Network with VAE for Intelligent Garbage Detection and Classification. 73:1-73:7 - Wenyu Fan:
Multi-constrained Vehicle Routing Problem Solution based on Adaptive Genetic Algorithm. 74:1-74:5 - Ismael Utitiaj, Paulina Morillo, Diego Vallejo-Huanga:
Sentiment Analysis Tool for Spanish Tweets in the Ecuadorian Context. 75:1-75:6 - Ankush Chopra, Shruti Agrawal, Sohom Ghosh:
Applying Transfer Learning for Improving Domain-Specific Search Experience Using Query to Question Similarity. 76:1-76:8 - Maoxian Zhou, Jia Secha, Rangjia Cai:
Domain Adaptation for Tibetan-Chinese Neural Machine Translation. 77:1-77:5 - Sangjie Duanzhu, Rui Zhang, Cairang Jia:
Bidirectional Boost: On Improving Tibetan-Chinese Neural Machine Translation With Back-Translation and Self-Learning. 78:1-78:6 - Yuhui Wang, Diane J. Cook:
BraIN: A Bidirectional Generative Adversarial Networks for image captions. 79:1-79:6 - Jianzhuo Yan, Yanan Geng, Hongxia Xu, Yongchuan Yu, Shaofeng Tan, Dongdong He:
Research on Named Entity Recognition in Chinese EMR Based on Semi-Supervised Learning with Dual Selected Strategy. 80:1-80:10 - Siyin Kong, Ping Zhu, Qian Yang, Zhihua Wei:
HSCKE: A Hybrid Supervised Method for Chinese Keywords Extraction. 81:1-81:7 - Jiaye Wu, Jie Liu, Xudong Luo:
Few-Shot Legal Knowledge Question Answering System for COVID-19 Epidemic. 82:1-82:6 - Ming Du, Wenkun Wang, Sufen Wang, Bo Xu:
A unified framework for attribute extraction in electronic medical records. 83:1-83:7 - Jiaorou Yin, Pengfei Duan, Weitao Huang, Shengwu Xiong:
Probabilistic Graph Attention for Relation Extraction for Domain of Geography. 84:1-84:6 - Ruhaila Maskat, Muhammad Faizzuddin Zainal, Nurrissammimayantie Ismail, Norizah Ardi, Amirah Ahmad, Noriza Daud:
Automatic Labelling of Malay Cyberbullying Twitter Corpus using Combinations of Sentiment, Emotion and Toxicity Polarities. 85:1-85:6 - Nasir Jamal, Chen Xianqiao, Junaid Hussain Abro, Doniyor Tukhtakhunov:
Sentimental Analysis based on hybrid approach of Latent Dirichlet Allocation and Machine Learning for Large-Scale of Imbalanced Twitter Data. 86:1-86:7 - Ronie C. Bituin, Ronielle B. Antonio, James A. Esquivel:
Harmonic Means between TF-IDF and Angle of Similarity to Identify Prospective Applicants in a Recruitment Setting. 87:1-87:5 - Bei Zhu, Jing Li, Rongbin Gu, Liang Wang:
An Approach to Cloud Platform Log Anomaly Detection Based on Natural Language Processing and LSTM. 88:1-88:7 - Anyi Wang, Peiru Liu:
Digital signal modulation recognition method based on high-order cumulants and wavelet transform. 89:1-89:6 - Arip Asadulaev, Gideon Stein, Andrey Filchenkov:
Transgenerators. 90:1-90:5 - Dian Ira Putri Hutasoit, Damayanti Elisabeth, Dana Indra Sensuse:
Knowledge Sharing for Multinational Corporations using Technology: A Systematic Literature Review. 91:1-91:8 - Yuwu Feng, Guohua Hu, Lei Hong:
Acoustic Source Positioning based on Sensor Selection in Wireless Sensor Network. 92:1-92:5 - Nickolay Viuginov, Petr Grachev, Andrey Filchenkov:
A Machine Learning Based Plagiarism Detection in Source Code. 93:1-93:6 - Qing Wang, Kai Wang, Wai Chen:
CLGNet: A New Network for Human Pose Estimation using Commodity Millimeter Wave Radar. 94:1-94:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.