default search action
SPAC 2018: Jinan, China
- 2018 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2018, Jinan, China, December 14-17, 2018. IEEE 2018, ISBN 978-1-7281-0551-2
- Yongheng Deng, Qing Xie, Yong Wang:
Research on investor sentiment and stock market prediction based on Weibo text. 1-5 - Li Li, Pengcheng Wei:
Synchronization of Delay Memristive System with Piecewise Function based on a Disturbance Observer. 6-10 - Sai Qiao, Xiaorong Zhu:
Dividend payout and dual-class companies based on big data analysis. 11-13 - Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. 14-19 - Yanling Yao, Feng Yuan:
Visualization Analysis of International TCM Informatization Research Field. 20-25 - Guodong Mou, Guochang Li, Tao Du:
Research on Modeling Prediction Methods of Process Optimization for Thermoelectric Production. 26-32 - Guozheng Feng, Jindong Xu, Baode Fan, Tianyu Zhao, Meng Zhu, Xiao Sun, Jin Zhou, Shi-Yuan Han:
Remote Sensing Image Classification Method Based on Preferential Adaptive Interval-Value Fuzzy C-Means. 33-36 - Xiyu Wang, Hengjian Li, Jian Qiu, Changzhi Yu:
Competition Code And LBP Palm Vein Feature-Level Fusion Using Canonical Correlation Analysis. 37-41 - Yong-Qin Li, Bu-Dong Xu, Hai-Di Sheng:
Bag-of-visual-words Model for Image Classification Based on Spatial Semantic Distribution. 42-46 - Shengke Wang, Rui Li, Xin Lv, Xiaoyan Zhang, Jianlin Zhu, Junyu Dong:
People Counting Based on Head Detection and Reidentification in Overlapping Cameras System. 47-51 - Junwei Jin, C. L. Philip Chen, Jin Zhou:
Image Recognition Using Manifold Constrained Collaborative Representation. 52-56 - Qiying Feng, C. L. Philip Chen, Jin Zhou:
Hyper-parameter Analysis of the Improved Deep Embedding Clustering Model. 57-60 - Hongxuan Hua:
CPSNF: Classification of Protein Structure with Novel Features. 61-65 - Kaixin Lu, Zhi Liu:
Adaptive Fuzzy Inverse Compensation For Actuator Dead-zone With Piecewise Time-varying Parameters. 66-70 - Yinghong Sun, Peng Wu, Jin Zhou, Dong Wang:
Evaluation and Prediction of Entrepreneurial Intention Based on Entrepreneurial Psychological Capital and Work Value of University Students: Using BP Neural Network Method. 71-74 - QuangDuy Nguyen, Tieshan Li, Liang'en Yuan, Qi-He Shan, Yuchi Cao:
Sliding Mode Control for Fin Stabilizer System of Marine Vessels with PID Sliding Surface. 75-79 - Jing Wang, Philip Chen, Zhenyuan Ma, Zhenghong Xiao:
Fuzzy Neural Networks (FNNs) Training Algorithm With Dropout via Its Equivalent Fully Connected Fuzzy Inference Systems (F-CONFIS). 80-84 - Xiaoming Liu, Chao Shen, Yingyue Fan, Xiaozi Liu, Yadong Zhou, Xiaohong Guan:
A Co-Evolutionary Model for Inferring Online Social Network User Behaviors. 85-90 - Jing Xu, Peng Wu, Yuehui Chen, Li Zhang:
Comparison of Different Classification Methods for Breast Cancer Subtypes Prediction. 91-96 - Tianjun Li, Long Chen, Huiqin Wei:
Classification based Integration of Quantifications for LC-MS Analysis. 97-102 - Guilu Li, Chang-E Ren, Zhengtao Ding, Zhiping Shi:
Adaptive NN leader-following consensus control of second-order nonlinear multi-agent systems with unknown control gains. 103-108 - Tianhao Li, Fengyang Sun, Runyuan Sun, Lin Wang, Meihui Li, Huawei Yang:
Chinese Herbal Medicine Classification Using Convolutional Neural Network with Multiscale Images and Data Augmentation. 109-113 - Xiangru Yu, Fudong Cai, Yimin Dou, Jinping Li:
Camera Abnormal Movement and Foreign Object Invasion Detection Based on Cumulative Edge Distribution Probability Model. 114-119 - Tiyu Fang, Huiwu Chen, Jianjie Shi, Jinping Li:
Positioning and Pressing Elevator Button by Binocular Vision and Robot Manipulator. 120-133 - Jianfeng Song, Zhen Zhang, Yutao Qi, Qiguang Miao:
Point Symbol Recognition Algorithm based on Improved Generalized Hough Transform and Nonlinear Mapping. 134-139 - Wenjun Quan, Qing Zhou:
Predicting the students with mental health risk by using Internet access logs. 140 - Hai Nan, Wanping Liu, Chao Liu, Chengyun Song:
Weak Ordering Space Search in Turn-based War Chess Gaming. 141-145 - Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. 146-151 - Bin Ma, Qianqian Zhang, Xianzhong Xie:
Modeling and Analysis for Spectrum Handoff in Cognitive Heterogeneous Wireless Network. 152-157 - Shu-Yu Yang, Shun-Ming Deng, Peng-Peng Zhao, Jin-Ping Li:
A visual self-positioning method for inspection robot based on symmetrical tangential artificial landmarks. 158-163 - Bozhan Dang, Jin Zhou, Yingxu Wang, Guangmei Xu, Dong Wang, Lin Wang, Shi-Yuan Han, Yuehui Chen:
Transfer Learning for Entropy-Weighted Fuzzy Clustering. 164-168 - Tianjie Wang, Yihui Wang, Chengxiang Tan:
Construction and Application of Knowledge Graph System in Computer Science. 169-172 - Hongxuan Hua:
IPSNN: Identification of Protein Structure based Neural Network. 173-177 - Shenhao Zhang, Yihui Wang, Chengxiang Tan:
Research on Text Classification for Identifying Fake News. 178-181 - Meixiang Ding, Zhixiang Xiong, Jian Yu:
Anomaly Detection Based on Job Monitoring Metrics in Distributed System. 182-186 - Xiaohu Yin, Zhiyi Zhang, Haiyan Liu, Lu Zhang, Xinghai Yang, Changzhi Wei:
Analysis of Ideological and Political Education System Based on the Basic Element Correlation Theory. 187-192 - Guang Yang, Lie Dai, Yan Lei:
A secure and energy balanced clustering protocol for underwater wireless sensor networks. 193-198 - Shouqiang Wang, Zengxiao Chi, Shen Zhang:
Research on relay node placement algorithm based on its capacity limitation in WSN. 199-202 - Kefeng Li, Guangyuan Zhang, Peng Wang:
Hand-dorsa Vein Recognition based on Deep Learning. 203-207 - Shuai Sui, C. L. Philip Chen:
Finite-Time Fault-Tolerant Control for a Nonlinear SISO System with Actuator Faults. 208-212 - Zhongyang Rao, Guang Yang, Chunyuan Feng:
Chord Recognition Based On Sequential Sparse Representation Classification. 213-216 - Ping Yu, Tao Xu, Bo Zheng, Yanfeng Zhang:
Research and implementation of multiscale dynamic terrain. 217-222 - Kashif Shaheed, Lu Yang, Gongping Yang, Imran Qureshi, Yilong Yin:
Novel Image Quality Assessment and Enhancement Techniques for Finger Vein Recognition. 223-231 - Weifang Wang, Jiwen Dong, Sijie Niu, Yuehui Chen:
Non-local similarity edge-guided based semi-coupled dictionary learning super resolution. 232-236 - Shuangrong Liu, Lin Wang, Bo Yang, Shuo Kong, Huifen Dong, Xuehui Zhu:
Fuzzy Nearest Neighbor Partitioning Neural Network for Classification. 237-241 - Wei Tian, Yishen Pang, Sijie Niu, Haochen Yang, Jiwen Dong, Jin Zhou, Yuehui Chen:
Automatic identification of vulnerable plaque based on flexible neural tree. 242-245 - Tan Dong, Yanxia Wang, Liu Lei:
A File Encryption Algorithm Based on Dynamic Block Out of order Matrix Mapping. 246-248 - Jingjing Yang, Tieshan Li, Yi Zuo, Ye Tian, Yuchi Cao, He Yang, C. L. Philip Chen:
Forecast Application of Time Series Model Based on BLS in Port Cargo Throughput. 249-254 - Guangmei Xu, Jiwen Dong, Jin Zhou, Yingxu Wang, Bozhan Dang, Dong Wang, Lin Wang, Shi-Yuan Han:
An improved fuzzy c-means clustering algorithm with guided filter for Image Segmentation. 255-258 - Wenshun Lv, Fang Wang:
Finite Time Adaptive Fuzzy Control for MIMO Nonlinear Systems Under Actuator Failures. 259-263 - Xinying Zhao, Kun Luo:
The Use of MATLAB and GT-SUITE in Simulation and Optimization of The Diesel Exhaust After-treatment System. 264-267 - Tingting Yang, Feng Cao, Yongming Li, Shaocheng Tong:
Adaptive Fuzzy Inverse Optimal Control for A Class of Two Order Nonlinear Systems. 268-272 - Hao Sun, Yongming Li, Shaocheng Tong:
A Fuzzy Adaptive Control Strategy for Active Suspension Systems with Unknown Dynamics. 273-278 - Ran Liu, Miao Xu, Yanzhen Zhang, Yangting Zheng, Yang Zhao, Yaqiong Liu:
Hardware Architecture for Real-Time Depth-image-based Rendering System. 279-284 - Tianjiao Liang, Zhongtao Li, Libin Hu, Shipeng Xiao:
skeletal model de-nosing with cascaded network. 285-289 - Dan-Ting Duan, Nan-Kun Mu, Xiao-Feng Liao:
An Adaptive Differential Evolution Algorithm Based on Fuzzy Modeling. 290-293 - Yin-Ping Zhao, Long Chen, C. L. Philip Chen:
The Construction of Cascaded Features and Its Application in Fuzzy Clustering. 294-298 - Li Guo, Long Chen, C. L. Philip Chen, Tianjun Li, Jin Zhou:
Clustering based Image Segmentation via Weighted Fusion of Non-local and Local Information. 299-303 - Xiaoxiao Sun, Shaomin Mu, Yongyu Xu, Zhihao Cao, Tingting Su:
Image Recognition of Tea Leaf Diseases Based on Convolutional Neural Network. 304-309 - Bicao Li, Chunlei Li, Zhoufeng Liu, Zhuhong Shao, Miaomiao Wei, Jie Huang:
Multi-Modal Medical Volume Registration Using a New Information Theoretic Measure. 310-315 - Chang Tan, Weihua Cao, Xin Chen, Min Wu, Zhentao Liu, Jinbin Li:
The Visual Positioning Method of Substation Robot Busbars fittings. 316-320 - Xia Zhang, Yingming Sun:
Breast cancer risk prediction model based on C5.0 algorithm for postmenopausal women. 321-325 - Zhenkai Lin, Changfeng Lv, Yimin Dou, Jinping Li:
Smoking Behavior Detection Based on Hand Trajectory Tracking and Mouth Saturation Changes. 326-331 - Ye Han, Tieshan Li, Yi Zuo, Ye Tian, Yuchi Cao, C. L. Philip Chen:
Application of Broad Learning System for Container Number Identification. 332-336 - Yanfeng Zhang, Yiqiang Wei, Liang Ma:
Research and application of security video labeling platform. 337-342 - Yi-Lin Bei, Sai Qiao, Mingxia Liu, Xiaorong Zhu, Qian Zhang:
A Color Image Watermarking Scheme Against Geometric Rotation Attacks Based on HVS and DCT-DWT. 343-347 - Rui Wang, Jinfeng Zhao, Lizhi Peng, Bo Yang, Lin Wang, Baosheng Li:
Medical entity recognition of Esophageal Carcinoma based on word clustering. 348-353 - Jiatai Lin, Zhi Liu, Jin Lai:
Wavelet Broad Learning Filter: A Novel Adaptive Filter for estimating the Physiological Tremor in Teleoperation. 354-359 - Xiunan Zheng, Jianpei Ding, Zengzhi Pang, Jinping Li:
Detection of Impurity and Bubble Defects in Tire X-Ray Image Based on Improved Extremum Filter and Locally Adaptive-threshold Binaryzation. 360-365 - Renlong Chen, Mingjun Liu, Xueyan Gong, Jinping Li:
Pixels Matching in No Obvious Feature Area in Binocular Vision Based on Peripheral Feature Points. 366-371 - Xiaoshuang Li, Ziyang Chen, Fenghua Zhu, Wei Chang, Chang Tan, Gang Xiong:
Short-term Bus Passenger Flow Forecast Based On Deep Learning. 372-376 - Xiaorong Zhu, Sai Qiao, Qian Zhang, Yi-Lin Bei, Hong-guo Zhao:
Filter-SSLE method based on line search technology. 377-380 - Ruizhi Han, C. L. Philip Chen, Shuang Feng:
Broad Learning System for Class Incremental Learning. 381-386 - Tao Xu, Zhiquan Feng, Wenyin Zhang, Xiaohui Yang, Ping Yu:
Depth based Hand Gesture Recognition for Smart Teaching. 387-390 - Wenyuan Fan, Qingjie Liu, Tao Xu:
Fast and Efficient Image Retrieval via Fully-Convolutional Hashing Network. 391-395 - Di Gao, Qingliang Li, Shuhua Yang, Liwen Ma, Yingjie He, Zhiqiang Cao:
A NB-IoT Passthrough Module for Big Data. 396-400 - Ling Chen, Gang Wei, Zhicheng Wang:
PointAGCN: Adaptive Spectral Graph CNN for Point Cloud Feature Learning. 401-406 - Ping Yu, Songjiang Wang, Yanlei Zong, Chong Liang:
The error metric based on roughness. 407-412 - Shao-Ting Ge, Zhimin Liu, Lijuan Kang, Zhenxiang Yuan, Guanan Yao, Ruoxuan Lin:
Stability Analysis of An e-SEIR System in Network Society. 413-416 - Shengke Wang, Xin Lv, Rui Li, Changyin Yu, Junyu Dong:
Characters Verification via Siamese Convolutional Neural Network. 417-420 - Zongqi Mu:
Transmission Line Inspection Image Recognition Technology Based on YOLOv2 Network. 421-428 - Wei Zheng, Xiuping Teng:
Image Shadow Removal Based on Residual Neural Network. 429-434 - Hongwei Sun:
End to End Background Subtraction by Deep Convolutional Neural Network. 435-440 - Zhihao Cao, Shaomin Mu, Yongyu Xu, Mengping Dong:
Image retrieval method based on CNN and dimension reduction. 441-445 - Ke Ji, Yahan Yuan, Runyuan Sun, Kun Ma, Zhenxiang Chen, Jian Liu:
A Bagging-based ensemble method for recommendations under uncertain rating data. 446-450 - Bing-Yan Zhang, Changzhi Wei, Xinghai Yang, Bei-Bei Song:
Design and implementation of a network based intrusion detection systems. 451-454 - Bei-Bei Song, Yutai Wang, Xinghai Yang, Bing-Yan Zhang:
Design and Implementation of Wireless Network Security Intelligent Experimental Teaching Platform Based on Text Similarity Calculation. 455-459 - Ti-Wei Tao, De-Yun Yang, Lin-Lin Wang, Ming-Xia Liu:
Effective Distance based Low Rank Representation for Image Classification. 460-464 - Jianan Shen, Zhiping Zhou, Xianhui Liu:
Coarse-to-fine Double Linear Iteration Method for Generating Superpixels. 465-470 - Chunran Wen, Xu Shen, Zhiping Zhou:
Research on the Influencing Factors of Regional Financial Risk under Internet Financial Innovation. 471-476 - Miaomiao Wei, Zhoufeng Liu, Chunlei Li, Ruimin Yang, Bicao Li, Qingwei Xu:
A Combined Satellite Selection Algorithm. 477-480 - Xiaolei Cha, Xiaohui Yang, Zhiquan Feng, Tao Xu, Xue Fan, Jinglan Tian:
Calibration-Free Gaze Zone Estimation Using Convolutional Neural Network. 481-484 - Xue Fan, Zhiquan Feng, Xiaohui Yang, Tao Xu, Jinglan Tian, Na Lv:
Haze weather recognition based on multiple features and Random Forest. 485-488 - Lei Pang, Nianqiang Li, Li Zhao, Wenxiu Shi, Yunpan Du:
Facial expression recognition based on Gabor feature and neural network. 489-493 - Yanyu Cao, Xiaodong Zhao, Zhiping Zhou, Yufei Chen, Xianhui Liu, Yongming Lang:
MIAC: Mutual-Information Classifier with ADASYN for Imbalanced Classification. 494-498 - Fujia Cheng, Chengxiang Tan:
SEDalvik: A Kernel-Level Android Behavior Forensic Method. 499-503 - Feng Yao, Ang Li, Ping Ding, Lei Li:
Nuclear Clustering Algorithm on State Grid's IT Operation Log. 504-509 - Bingshu Wang, C. L. Philip Chen:
License Plate Character Segmentation Using Key Character Location and Projection Analysis. 510-514 - Yan Yang, Junpu Wang, Zhoufeng Liu, Chunlei Li, Bicao Li, Qingwei Xu:
Fabric Defect Detection Method Based on Sparse and Dense Mixed Low-rank Decomposition. 515-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.