


default search action
CSAI/ICIMT 2018: Shenzhen, China
- Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, CSAI 2018, the 10th International Conference on Information and Multimedia Technology, ICIMT 2018, Shenzhen, China, December 08-10, 2018. ACM 2018, ISBN 978-1-4503-6606-9

Machine Learning
- Xiaofeng Liu:

Experimental Study of Chinese POS Tagging. 1-5 - Yong Jiang, Chunyang Li, Nan Li, Tao Feng, Meilian Liu:

HAASD: A dataset of Household Appliances Abnormal Sound Detection. 6-10 - Zhen Yang, Wanpeng Zhang, Hongfu Liu:

Artificial Intelligence Techniques on Real-time Strategy Games. 11-21 - Andrew Hoblitzell, Meghna Babbar-Sebens, Snehasis Mukhopadhyay:

Machine Learning with Small Data for User Modeling of Watershed Stakeholders Engaged in Interactive Optimization. 22-27 - Tao Wu, Yong Jiang, Nan Li, Tao Feng:

An Indoor Sound Source Localization Dataset for Machine Learning. 28-32 - Ming Zhan, Ruibo Tu, Qin Yu:

Understanding Readers: Conducting Sentiment Analysis of Instagram Captions. 33-40 - Haijing Tang, Jing Zhao, Xu Yang:

Explore Machine Learning for Analysis and Prediction of Lung Cancer Related Risk Factors. 41-45
Neural Network and Algorithm
- Jichao Li, Haobin Shi

, Xinru Li, Meng Xu:
A Layered After-sale Quality Evaluation Model Based on Improved Artificial Neural Network. 46-51 - Mengjie Bai, Jiarui Sun, Kaili Cheng, Jingting Luo, Yong Zhao:

A Convolutional Neural Network Combined with Color Deconvolution for Mitosis Detection. 52-57 - Jiarun Cao, Chongwen Wang:

Social Media Text Generation Based on Neural Network Model. 58-61 - Jun Ou, Yujian Li:

Two-Dimensional Perceptrons. 62-66 - Zhenye Gan, Xiaotian Xing, Hongwu Yang

, Guangying Zhao:
Mandarin-Tibetan Cross-Lingual Voice Conversion System Based on Deep Neural Network. 67-71 - Jiayu Liu, Wei Pan, RuoPeng Qu, Meng Xu:

Research on the Application of PID Control with Neural Network and Parameter Adjustment Method of PID Controller. 72-76 - Lei Sun, Yuehan Wang, Leyu Dai:

Convolutional Neural Network Protection Method of Lenet-5-Like Structure. 77-80 - Yalei Ding, Yuqing Zhai:

Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks. 81-85 - Dongzhi Cao, Xinglan Zhang, Zhenhu Ning, Jianfeng Zhao, Fei Xue, Yongli Yang:

An Efficient Malicious Code Detection System Based on Convolutional Neural Networks. 86-89 - Tawansongsang Karnkawinpong, Yachai Limpiyakorn

:
Chest X-Ray Analysis of Tuberculosis by Convolutional Neural Networks with Affine Transforms. 90-93 - Jingting Luo, Canmiao Fu, Mengjie Bai, Yong Zhao:

Atrial Fibrillation Detection with Convolutional Neural Network. 94-98 - Mingbo Hong, Mantao Wang, Lixin Luo, Xuefeng Tan, Dejun Zhang, Yike Lao:

Combining Gated Recurrent Unit and Attention Pooling for Sentimental Classification. 99-104
Data Science and Big Data Technology
- Bin Yu, Chen Zhang, Jiangyan Sun, Yu Zhang:

Massive GIS Spatio-temporal Data Storage Method in Cloud Environment. 105-109 - Fuzong Wang, Helin Guo, Jian Zhao:

Dynamic Data Compression Algorithm Selection for Big Data Processing on Local File System. 110-114 - Tao Jiang, Bin Zhang, Jun Yang:

Efficient Processing of Reverse Top-k Dominating Queries. 115-119 - Kwan-Hua Sim, Kwan Yong Sim

, Nicholas Bong:
Dynamic Time Interval Data Representation in Scalable Financial Time Series Pattern Recognition. 120-125 - Zhenggui Xiang

:
How Deep Is Optimal for Learning Locally on Smartphone. 126-130 - Alexey Samoylov, Nikolay Sergeev, Margarita Kucherova, Boris Denisov:

Methodology of Big Data Integration from A Priori Unknown Heterogeneous Data Sources. 131-135 - Peilun Wu, Jianyang Liu, Fayu Wang:

Method for Establishing Handwritten Character Data Set of Traditional Chinese Medicine Prescription. 136-139 - Peicong Luo, Xiaoying Wang, Hailong Jin, Yuling Li, Xuejiao Yang:

Load Management for Multiple Datacenters towards Demand Response in the Smart Grid Integrating Renewable Energy. 140-144
Software Design and Testing
- Jingxu Xiao

, Zi-cong Lu, Qi-han Xu:
A New Android Malicious Application Detection Method Using Feature Importance Score. 145-150 - Nurbojatmiko, Eko Kuswardono Budiardjo, Wahyu Catur Wibowo:

Slr on Identification & Classification of Non-Functional Requirements Attributes, and Its Representation in Functional Requirements. 151-157 - Hisham Elzain, Wu Yang:

QoS-aware Topology Discovery in Decentralized Software Defined Wireless Mesh Network (D-SDWMN) Architecture. 158-162 - Zhen-Yu Ma, Wei Zhang, Jian-Ping Wang, Fu-Sheng Liu, Kun Han, Fei Gao:

Research on a Method of Software Reliability Prediction Model. 163-167 - Xi Luo, Liming Wang, Zhen Xu, Kai Chen, Jing Yang, Tian Tian:

A Large Scale Analysis of DNS Water Torture Attack. 168-173 - Muhamad Hasbi, Eko Kuswardono Budiardjo, Wahyu Catur Wibowo:

Reverse Engineering in Software Product Line - A Systematic Literature Review. 174-179 - Chen Zhang, Xinyi Niu, Bin Yu:

A Method of Automatic Code Generation Based on AADL Model. 180-184 - Chunyu Yang, Yan Liu, Jia Yu:

Exploring Violations of Programming Styles: Insights from Open Source Projects. 185-189 - Yiming Xiao, Liang Xiao, Zhu Li:

Framework Research on the Implementation of Automated Test User Requirements. 190-194 - Yonggen Gu, Jiashen Chen, Xiaohong Wu:

An Implement of Smart Contract Based Decentralized Online Crowdsourcing Mechanism. 195-199
Intelligent Algorithms and High Performance Computing
- Jie Chen, Sheng Cheng, Meng Xu:

An Overview and Practical Application of Biological Intelligence Algorithm Used in Intelligence Control. 200-206 - Yang Zhang, Chao Li

, Chuqing Cao, Yunfeng Gao:
An Improved ORB Feature Point Matching Algorithm. 207-211 - Junying Shang, Kan Li:

Dynamic Update Upper Bounds Influence Maximization Algorithm. 212-217 - Luo Liang, Ruichun Tang:

An Improved Collaborative Filtering Algorithm Based on Node2vec. 218-222 - Nanfeng Jiang, Li Guo, Gongde Guo:

Target Tracking based on Kernel Correlative Filters and SIFT features - A Self-Adaptive Scale Algorithm. 223-226 - Jin Ning, Leiting Chen, Junwei Chen:

Relative Density-Based Outlier Detection Algorithm. 227-231 - Zehua Zhao, Yan Ma, Qun Cong:

GDSF-Based Low Access Latency Web Proxy Caching Replacement Algorithm. 232-236 - Gang Lin, Lixiao Zheng, Yuanyang Wang:

An Algorithm for Learning Regular Expressions Based on Repeated String Detection. 237-241 - Rolly Intan, Siana Halim

, Lily Puspa Dewi
:
Fuzzy Granularity in the Knowledge-based Dynamic Fuzzy Sets. 242-246 - Delfina Malandrino

, Rocco Zaccagnino
, Rosalba Zizza:
A Multi-objective Optimization Model for Music Styles. 247-251 - Yao Wang, Wei Pan, An Liu, Meng Xu:

A Method of Multi-attribute Group Decision-making Based on Nearness of Triangular Fuzzy Numbers. 252-257
Pattern Recognition
- Ming Gu, Kun Hao, Zhiyi Qu:

Flag Detection with Convolutional Network. 258-262 - Xiao Zhang, Zheng Qin, Yongqiang Lyu:

Biometric Authentication via Finger Photoplethysmogram. 263-267 - Weiming Liu, Bin Yu, Chen Zhang, Han Wang, Ke Pan:

Chinese Named Entity Recognition Based on Rules and Conditional Random Field. 268-272 - Yulin Wu, Mingyan Jiang:

Multi-layer CNN Features Fusion and Classifier Optimization for Face Recognition. 273-276 - Wencan Zhong, Alex Noel Joseph Raj

, Palaiahnakote Shivakumara
, Zhemin Zhuang, Tong Lu, Umapada Pal:
A New Shadow Detection and Depth Removal Method for 3D Text Recognition in Scene Images. 277-281 - Guo Xianjing, Yong Li:

Text Implication Recognition Learning with Gated Recurrent Unit. 282-285 - Wuhao Zhang, Lizhuang Ma, Yanhao Ge:

Raftnet: Extract Task-aware Features for Pedestrian Attribute Recognition. 286-290
Computer Vision and Visualization
- Zhuoyue Yang, Dianxi Shi:

Mapping Technology in Visual SLAM: A Review. 291-295 - Qiangrong Yang, Jianyao Hu:

The Ceprei-Scape Dataset for the Validation of Autonomous Driving. 296-299 - Xun Chen, Siwei Xia, Hu Lu:

Failure Discrimination Mechanism Joint Blocking Training for Target Tracking. 300-304 - Hao Chen, Peng Wu, Juan Meng:

Video Detection System of Traffic Flow toward Urban Roads. 305-308 - Jiaohao Zhang, Qiang Zhang, Chunlei Shi:

An Unmanned Aerial Vehicle Detection Algorithm Based on Semantic Segmentation and Visual Attention Mechanism. 309-313 - Xiaolong Liu, Zehui Wu, Qiang Wei:

An Improved Offline Symbolic Execution Approach. 314-320
Image Processing and Application
- Chaitanya Sethi, Harsh Dabas, Chirag Dua, Mohit Dalawat, Divyashikha Sethia

:
EEG-Based Attention Feedback to Improve Focus in E-Learning. 321-326 - Kun Liu, Nana Luo, Yafei Ren:

A Contrast Pre-adjusted Defect Detection of Strip Steel Surface by Total Variation-based Image Decomposition. 327-333 - Huihui Xu, Mingyan Jiang:

Non-Parametric Learning-based Depth Estimation from a Single Image in the Fourier Domain. 334-338 - Yongkai Ye, Xinwang Liu, Jianping Yin:

Multi-view Clustering with Noisy Views. 339-344 - Hanfei Xu, Yangang Cai, Ronggang Wang:

Depth Estimation in Multi-View Stereo Based on Image Pyramid. 345-349 - Sanghyun Seo, Juntae Kim:

Image-Text Embedding with Hierarchical Knowledge for Cross-Modal Retrieval. 350-353 - Shaohan Chen, Shu Wang:

Deep Learning Based Non-rigid Device Tracking in Ultrasound Image. 354-358 - Yaopu Zhao, Yanchao Yu, Ying Li:

Research on Construction Technology of 3D Scene Point Cloud Model Based on Improved PMVS Algorithm. 359-363 - Ming Chen, Xudong Zhao

:
Fatty Liver Disease Prediction Based on Multi-Layer Random Forest Model. 364-368 - YaoHua Yang, Shiqing Zhang, Li Shen:

Control Divergence Optimization through Partial Warp Regrouping in GPGPUs. 369-374 - Xiaoyan Xu, Xiaofeng Song, Rongcai Zhao:

Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography. 375-379
Signal Processing
- Harsh Dabas, Chaitanya Sethi, Chirag Dua, Mohit Dalawat, Divyashikha Sethia

:
Emotion Classification Using EEG Signals. 380-384 - Hao Wu, Qingzeng Song, Guanghao Jin:

Deep Learning based Framework for Underwater Acoustic Signal Recognition and Classification. 385-388 - Xiaorong Feng, Qingsong Ai, Wei Meng

:
KUKA Real-Time Control through Angle Estimation of Wrist from sEMG with Support Vector Regression. 389-393 - Liying Zhao, Qiuyan Wang, Xin Dang:

Recognition Influence of Different Acousitc Characters between Male and Female Speakers. 394-398
Modern Information Theory and Technology
- Zi-Xuan Zhang, Wen-ning Hao, Gang Chen, Jun-Yue Chen, You-Wei Xu:

An Extension of MIC for Multivariate Correlation Analysis Based on Interaction Information. 399-403 - Zhe Wang

:
Teamworking Strategies of Scrum Team: A Multi-Agent based Simulation. 404-408 - Chen Huang, Gongshen Liu:

Sentiment Analysis of Network Comments Based on GCNN. 409-413 - Zhenyu Pan, Jie Xue, Yang Gao, Honghao Wang, Guanling Chen:

Revealing the Relations between Learning Behaviors and Examination Scores via a Prediction System. 414-419 - Huanhuan Yuan, Yongli Wang, Xia Feng, Shurong Sun:

Sentiment Analysis Based on Weighted Word2vec and Att-LSTM. 420-424 - Daozhen Min, Lei Huang:

Research on Recommendation Methods Based on Sentiment Analysis and BTM Topic Modeling. 425-430 - Zeyuan Li, Jie He, Dagang Chen, Xin Fang, Yajun Song, Zesong Li:

A Hybrid Approach for Measuring Similarity between Government Documents of China. 431-435 - Adam L. Miller:

Video Editing Stepping Stones: Using Podcasts and Music Videos to Introduce Editing Techniques to Film Studies Students. 436-440 - Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang:

Digital Cardan Grille: A Modern Approach for Information Hiding. 441-446 - Chengfei Li, Li Liu, Fan Jiang:

Intelligent Question Answering Model Based on CN-BiLSTM. 447-450 - Hadi Sutopo

, Ferryal Abadi:
Mobile Multimedia-Based Tourism Promotion Development. 451-454 - D. A. Volzhaninov, O. N. Lookin, I. N. Antsygin, A. D. Khokhlova:

Design and Programming of the Micromanipulator Network to Study Single Cardiac Cell Mechanics. 455-458
Computer Network and Communication Engineering
- Yanzong Guo, Wangpeng He, Juanjuan Zhu, Cheng Li

:
A Light Autoencoder Networks for Face Swapping. 459-462 - Jae-Hong Kim, Yang-Seo Choi, Jung-Chan Na:

Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems. 463-467 - Shiqiang Zhang, Zhenhu Ning, Yang Cao:

Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs. 468-473 - Ruining Chen, Guoao Sun:

A Survey of Kernel-Bypass Techniques in Network Stack. 474-477 - Lijun Zhou, Hongyun Li, Jianlin Zhang:

Multi-feature fusion Siamese Network for Real-Time Object Tracking. 478-481 - Ying Li, Siya Xu, Wei Deng, Xiangyu Kong, Xujing Peng, Weichun Ge:

A Cost and Load Balancing based FiWi Network ONU Planning Method for Multimedia Services. 482-486 - Bahaa Hussein Taher, Lu Hong Wei, Ali A. Yassin:

Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function. 487-494 - Wei Mao, Zhen Shen, Xiaolong Huang:

Facilitating Network Functions Virtualization by Exploring Locality in Network Traffic: A Proposal. 495-499 - Ling Zou, Jing Li:

An Implicit Smart Interaction Orienting to the Context Semantics of Mobile Device. 500-505
Computer Science and Engineering
- Sijia Li, Hongan Zhao, Xinyang Liu:

Virtual Mining Simulation of Cultural Relics Based on Virtual Reality. 506-510 - Jiashu Liu, Guang Chen, Jun Guo:

SENet for Weakly-Supervised Relation Extraction. 511-515 - Rui Yao, Yang Cao, Zhiming Ding, Limin Guo:

A Sensitive Words Filtering Model Based on Web Text Features. 516-520 - Feng Jiang, Zhenghao Zhang, Ping Chen, Yongrui Liu:

Naive Bayes Text Categorization Algorithm Based on TF-IDF Attribute Weighting. 521-525 - Shaohua Wang, Zhengqing Jiang:

Research on the Influencing Factors of Experience Comfort of Virtual Experiential Amusement Products. 526-529 - Dan Li, Liming Wang:

Detecting Chinese Domain Name Piracy. 530-535 - Junrong Ze, Hanxu Hou, Yunghsiang S. Han:

Comparison on Binary MDS Array Codes for Single Disk Failure Recovery. 536-541 - Xiaoyan Xu, Linna Fan, Rongcai Zhao:

Steganalysis of Content-Adaptive JPEG Steganography Based on CNN and 2D Gabor Filters. 542-547 - Yue Zhou, Yang Ji, Chujie Tian

:
A Prediction Model of Wechat Official Account's Article Reading Volume. 548-555 - Pisut Oncharoen, Peerapon Vateekul

:
Deep Learning Using Risk-Reward Function for Stock Market Prediction. 556-561
Modern Electronic Technology and Intelligent Control System
- Chun-Yi Lee, Tsai-Ling Kao, Ko-Shyang Wang:

Implementation of a Robotic Arm with 3D Vision for Shoes Glue Spraying System. 562-565 - Fan Yang, Ping Wang, Xinhong Wang:

Continuous Control in Car Simulator with Deep Reinforcement Learning. 566-570 - Zhenyu Wang, Xiangzhong Luo, Zheng Gong:

Application of Deep Learning in Analog Circuit Sizing. 571-575 - Bingnan Song, Dianxi Shi, Huiying Wang:

A Sensor Group Selection Mechanism Based on RGB Channels Scenario Sensing Method. 576-582 - Yongxing Teng, Ye Li, Hao Ji, Gang Li:

A Global Constrained Optimization Method for Designing Power Grid with Small Diameters. 583-588 - Baoding Xu, Ruichun Hou, Xiangqian Ding, Ye Tao:

Residential Electric Load Forecasting Method Based on Mutual Information and BP Network Combination Model. 589-593 - Zhenshen Qu, Jianxiong Shen, Ruikun Li, Junyu Liu, Qiuyu Guan:

PartsNet: A Unified Deep Network for Automotive Engine Precision Parts Defect Detection. 594-599 - Chenyu Xu, Ning Han, Hongxin Li:

A Dangerous Goods Detection Approach Based on YOLOv3. 600-603 - Yuqi Chen, Fuqiang Liu, Ping Wang, Chao Wang, Jia Hu

:
Development of a Cooperative Automated Driving System via LTE-V. 604-608 - Bingfei Dai, Jianping Li, Weidong Li

:
Semi-online Hierarchical Scheduling for Bag-of-tasks on Two Machines. 609-614 - Yujian Wu, Lei Huang:

Design of Dynamic Surveillance System for Port Bulk Cargo Entering and Leaving the Warehouse Based on RFID Technology. 615-619 - Yingxin Xu, Lei Sun, Songhui Guo, Shuai Li, Zewu Wang:

Research and Design of Reconfigurable Security Resource Pool Framework. 620-626

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














