


default search action
AISS 2021: Sanya, China
- AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26 - 28, 2021. ACM 2021, ISBN 978-1-4503-8586-2

- Mylene J. Domingo, Lance Christian L. Pua, Willson Pierce S. Pua, Hans Chester S. Talag:

University of Santo Tomas Department of Filipino Virtual Front Desk. 1:1-1:6 - Mylene J. Domingo, John Christian B. Fudotan, Alexandria Therese R. Sadang, Allyssa Bea R. Topacio, Jeremie Jun C. Viray:

MATYAG: A Tracking System to Prevent Potential Cases of Human Trafficking. 2:1-2:5 - Yuting Zhou, Xuemei Yang, Xiaoying Wang, Junping Yin:

Comparison of the proportional hazard model and the accelerated failure model in the mixed cure model. 3:1-3:6 - Liu Yang, Yan He, Shouye Lv, Jian Ma:

Radar Working Mode Recognition Method Based on Complex Network Analysis. 4:1-4:8 - Yexuan Ma, Chaobing Huang:

Facial Expression Recognition Based on Deep Learning and Attention Mechanism. 5:1-5:6 - Lei Zhang, Jinghua Sun, Ling Li, Jinling Cheng:

Commercial Aircraft On-Board Loadable Software Distribution and Control Digital Solution. 6:1-6:5 - Ruyi Chen, Shengwu Xiong:

Few-shot Adversarial Audio Driving Talking Face Generation. 7:1-7:6 - Jingchao Chen, Shiyi Mu, Shugong Xu

, Youdong Ding:
HENet: Forcing a Network to Think More for Font Recognition. 8:1-8:5 - Yunqiang Gao, Yan Shen, Zhe Yang, Dapeng Chen, Mingxin Yuan:

Immune Optimization Algorithm for Traveling Salesman Problem Based on Clustering Analysis and Self-Circulation. 9:1-9:7 - Xinye Zhao, Mei Yang, Cui Peng, Chao Wang:

Research on Intelligent Operational Assisted Decision-making of Naval Battlefield Based on Deep Reinforcement Learning. 10:1-10:7 - Tianyu Liu, Lei Yao, Bo Qiu, Pengqizi Huang:

A Residual Life Prediction model for Bivariate Degraded Products Based on Copula and Particle Filtering. 11:1-11:6 - Weiwei Zhang, Feng Gao, Haofang Liu:

Nonlinear Controller Design for Power System via TS Fuzzy Model. 12:1-12:4 - Yaru Sun, Ying Yang, Yongjian Wang:

Attention-Based Sub-Word Network for Multilingual Short Text Classification. 13:1-13:6 - Jia Yu

:
Citizen adoption of e-justice services: An empirical research in China. 14:1-14:5 - Xuan Wang, Ziyang Chen, Ziyang Chen:

Research on the Optimal Methods for Graph Edit Distance. 15:1-15:7 - Qinghe Liu, Yinghong Tian:

An Improved GAIL Based on Object Detection, GRU, and Attention. 16:1-16:8 - Yunhe Li, Huiyan Zhao, Bo Li, Yi Wang:

x4 Super-Resolution Analysis of Magnetic Resonance Imaging based on Generative Adversarial Network without Supervised Images. 17:1-17:5 - Yujia Fu, Jingling Wang:

Modeling of Sports News Information Dissemination in Social Networks. 18:1-18:6 - Zhongxuan Cai, Minglong Li:

A Robust and Learning Approach for Multi-Phase Aerial Search with UAVs. 19:1-19:5 - Xiaofei Qu, En Long, Shouye Lv, Pengfei Chen, Guangling Lai, Yuke Yang, Jisheng Du:

Ship Detection Method based on Scale Matched R3Det. 20:1-20:6 - Hua Jiang, Heng Zhang, Huijiao Wang, Xin Wang:

A Frequency-first Heuristic for Shortest Linear Programs. 21:1-21:6 - Zhongxuan Cai, Xuefeng Chang, Minglong Li:

A Cost-Efficient Platform Design for Distributed UAV Swarm Research. 22:1-22:6 - Xin Du:

FISC: Furniture image style classification model based on Gram transformation. 23:1-23:5 - Guoyi Wen, Yong Huang, Hongbo Yuan, Botao Tang, Haijia Zhang:

Design and realization of small anti-jamming GNSS antenna based on LTCC. 24:1-24:7 - Xinglong Cui, Ting Sun, Shuixin Deng, Yusen Xie, Lei Deng, Baohua Chen:

Unsupervised Barcode Image Reconstruction Based on Knowledge Distillation. 25:1-25:6 - Youna Jung, Noah Goldsmith, John Barker:

Survey of Trust Management on Mission-oriented Internet of Things. 26:1-26:5 - Benjamin Nast

, Kurt Sandkuhl
:
Meta-Model and Tool Support for the Organizational Aspects of Internet-of-Things Development Methods: Organizational Aspects of IoT Development Methods. 27:1-27:6 - Linxi Li:

Perspective on Intelligent Sensing System. 28:1-28:5 - Qihe Liu, Gao Yu, Yuanyuan Wang, Zeng Yi

:
A Novel DGA Domain Adversarial Sample Generation Method By Geometric Perturbation. 29:1-29:10 - Dipendra Pant

, Rabindra Bista
:
Image-based Malware Classification using Deep Convolutional Neural Network and Transfer Learning. 30:1-30:6 - Tao Leng, Aimin Yu:

A Framework of Darknet Forensics. 31:1-31:6 - Bidong Wang, Hui Liu, Xinli Han, Dongliang Xuan:

Image-based Ransomware Classification with Classifier Combination. 32:1-32:6 - Gloria Virginia, Juan Christian Tjandra, Budi Susanto

, Umi Proboyekti:
Search Engine Optimization by Re-Ranking the Product Search Result Based on User Click Data. 33:1-33:5 - Huiwen Fang, Chunhua Wu:

Neural Network Model Extraction Based on Adversarial Examples. 34:1-34:5 - Qinghuan Rao, Bin Wu:

Evaluation Model Based on Hesitation Fuzzy Theory. 35:1-35:8 - Ruonan Wang, Yuefeng Zhao:

A Survey on Anonymous Communication Systems Traffic Identification and Classification. 36:1-36:5 - Kittipat Saengkaenpetch, Chaodit Aswakul:

Cloud-Based Smart Energy Framework for Accelerated Data Analytics with Parallel Computing of Orchestrated Containers: Study Case of CU-BEMS. 37:1-37:6 - Yi Su, Baosheng Wang, Qianqian Xing, Xiaofeng Wang:

DISCA: Decentralized Infrastructure for Secure Community Attribute certifying. 38:1-38:8 - Su-Tzu Hsieh, Chin-Ta Chen:

Facial recognition with mask during pandemic period by big data technical of GMM. 39:1-39:3 - Luiz Fernando Capretz, Pradeep Waychal, Jingdong Jia, Shuib Bin Basri:

Comparing the Popularity of Testing Careers among Canadian, Indian, Chinese, and Malaysian Students. 40:1-40:7 - Jiao Peng, Shulin Yang, Xiang Li, Meiqi Zhou, Yongliang Huang:

Research on the Application of Blockchain in Educational Resources. 41:1-41:5 - Jie Zhang, Zipeng Zhang:

Research on Fermented Grains Steam Running Condition Prediction Model of Make Chinese Liquor Robot Based on GRU. 42:1-42:4 - Ping Jian:

Research on the information System architecture design framework and reference resources of American Army. 43:1-43:5 - Ruyun Zhang:

Preliminary Study of Secure-Enhanced Coherent Optical Orthogonal Frequency Division Multiplexing System Based on DNA Encoding. 44:1-44:6 - Guo-qing Ye, Xiao-tong Wang, Han-chang Wang, Yun-fa Zhou:

Wartime Consumption Prediction of Aircraft Carrier Airborne Ammunition Based on Case-Based Reasoning. 45:1-45:5 - Xiaohui Jia, Shuyang Qu, Tilei Gao, Bingfu Mou:

Research on Calculation Method of Software Service Risk Occurrence Probability Based on Markov Chain Theory. 46:1-46:5 - Wanli Yang, Huawei Li, Fei Wang, Dianle Zhou:

Cell Tracking based on Multi-frame Detection and Feature Fusion. 47:1-47:6 - Yang Xia, Chaobing Huang:

Chinese Intention Recognition Algorithm Based on BERT-GRU-Capsule Network. 48:1-48:6 - Huijia Ye, Juwei Rao, Yang Shi, Zhihua Li:

ProExtor: Mining API Protocols for Program Vulnerability Detection. 49:1-49:7 - Cong Xu, Haicheng Liu, Xinglei Miao:

Weak Target Detection Based on Message Passing Network Fusion with Deep Neural Network. 50:1-50:4 - Lu Yu, Wenjing Nie, Lun Xin, Manxue Guo:

Clustered Federated Learning Based on Data Distribution. 51:1-51:5 - Juan He, Mengya Li, Rong Zhou, Li Ning, Yan Liang:

Rapid Identification of Multiple Gases. 52:1-52:6 - Vladimir Kazakovtsev, Sergey Muravyov:

Application of the automatic selection and configuration of clustering algorithms method for the Apache Spark framework. 53:1-53:5 - Qianli Zhang, Qiusheng Li, Junyong Hu, Xianghui Xie:

Real-time detection of navel orange fruits in the natural environment based on deep learning. 54:1-54:7 - Xinjie Lan, Samet Bayram

, Kenneth E. Barner:
An Information Theoretic Defense Algorithm against Adversarial Attacks on Deep Learning. 55:1-55:5 - Chen Chen, Zhao Zhao

, Zhi-yong Xu:
Refinement of TDOA Measurements for Flush Mounting Planar Microphone Arrays Using Low Rank and Linear Geometric Constraints. 56:1-56:6 - Xuerui Chen, Guohua Peng:

Domain adaptation based on the measure of kernel-product maximum mean discrepancy. 57:1-57:6 - Kang Chen, Dehong Qiu:

Combined Metapath Based Attention Network for Heterogenous Networks Node Classification. 58:1-58:6 - Mengya Li, Juan He, Rong Zhou, Li Ning, Yan Liang:

Research on prediction model of mixed gas concentration based on CNN-LSTM network. 59:1-59:5 - Shuang Han, Mingjun Li, Boxuan Guo:

The high order finite volume weighted essentially non-oscillatory schemes to solve the Rayleigh-Taylor Instability. 60:1-60:5 - Kexin Jia, Yuxia Xin, Ting Cheng:

A Robust Multi-Sphere SVC Algorithm Based on Parameter Estimation. 61:1-61:5 - Suodong Liu, Lijia Tao, Chao Liu, Yunqiang Gao, Hongwei Sun, Mingxin Yuan:

Immune Cloning Optimization Algorithm Based on Antibody Similarity Screening and Steady-State Adjustment. 62:1-62:5 - Gang Chen, Su Jun Wang, Yifan Ping, Yi Jin, Changzhi Xu, Ying Zhao Shao, Zhao Han:

Mismatched filtering for Doppler ambiguity sidelobe suppression in passive bistatic radar. 63:1-63:6 - Su Jun Wang, Yifan Ping, Gang Chen, Li Yang, Wei Wen, Changzhi Xu, Ying Zhao Shao:

Target detection of remote sensing images based on deep learning method and system. 64:1-64:7 - Guodong Jiang, Jingjing Zhang, Jinyin Chen, Haibin Zheng, Zhiqing Chen, Liang Bao:

Unsupervised Face Recognition Algorithm based on Fast Density Clustering Algorithm. 65:1-65:6 - Yuanyuan Qu, Wenxue Wei, Jiajia Jiang, Yufeng Liang:

Neural-network-based Approach to Detect and Recognize Distorted Text in Images with Complicated Background. 66:1-66:7 - Yanjia Zhang

:
Groovy Pixels: Generating Drum Set Rhythms from Images. 67:1-67:5 - Maoxian Zhou, Secha Jia, Rangjia Cai:

Research on Tibetan-Chinese Neural Machine Translation Integrating Syntactic Information. 68:1-68:4 - Xiaohua Zhou, Xinkai Meng, Guanghui Sun, Jainbin Zheng, Wenrui Ye:

Automatic selection of ambient noise observation stations based on the clustering algorithm. 69:1-69:6 - Khulood Faisal, Dareen Alomari, Hind Alasmari, Hanan S. Alghamdi

, Kawther Saeedi:
Life Expectancy Estimation based on Machine Learning and Structured Predictors. 70:1-70:8 - Chaojie Wang:

A pattern-spectrum-based AP method for classification of noised speech signals. 71:1-71:5 - Quan Nguyen, Jingru Zhang:

Line-Constrained L∞ One-Center Problem on Uncertain Points. 72:1-72:5 - Chusi Huang, Jiandong Li:

Research on automatic leveling Control based on improved PID Neural Network. 73:1-73:10 - Qin Li, Wei Liu, Chaoyang Niu, Yanyun Wang

, Ouyang Gao, Yintu Bao, Weiqi Zou, Haobo Zhang, Qing Hu, Zhikang Lin, Chaofan Pan:
The influence of different preprocessing on radar signal recognition based on time-frequency analysis and deep learning. 74:1-74:5 - Shengjie Ding, Juan Liu, Lingfu Xie:

UAV-enabled Edge Computing for Virtual Reality. 75:1-75:8 - Li Xu, Juan Liu, Lingfu Xie, Xiaofan He:

Multi-UAV Navigation and Recharging for Fair and Sustainable Coverage in Wireless Networks. 76:1-76:6 - Jinjin Liu, Zhifeng Chen, Xiaonan Li, Tongxin Wei:

Distributed Deep Learning System for Efficient Face Recognition in Surveillance System. 77:1-77:6 - Chen Zhang, Juan Liu, Lingfu Xie, Xiaofan He:

Age-Optimal Data Gathering and Energy Recharging of UAV in Wireless Sensor Networks. 78:1-78:6 - Jose Emmanuel Cruz de la Cruz, Eudes Rigoberto Apaza Estaño, Luis Enrique Baca Wiesse, Oscar Jhon Vera Ramirez, Wilson Antony Mamani Machaca

:
Prediction of power of a photovoltaic system in height using hybrid models of Shinkrage regularization with RFE and SFS. 79:1-79:5 - Dongjie Li, Dong Li, Chuanpeng Wang, Yinan Chen

:
Network Embedding Method Based on Semantic Information. 80:1-80:6 - Hao Chen, Jiajia Wang, Yurong Liu, Jiangtao Xu, Chao Fan:

Rearch on quantitative evaluation technology of equipment battlefield environment adaptability. 81:1-81:5 - Changyou Shi, Jianping Lu, Qiang Sun, Shiliang Cheng, Xin Feng, Wei Huang:

Image Dehazing Via Cycle Generative Adversarial Network. 82:1-82:7 - Zhe Liu, Weijie Xia, Yongzhen Lei:

SAR-GPA: SAR Generation Perturbation Algorithm. 83:1-83:6 - Di Meng Shi, Jun Ji:

Method design based on the national scholarship system. 84:1-84:4 - Yu Gu, Jiangan Li:

A Novel WiFi Gesture Recognition Method Based on CNN-LSTM and Channel Attention. 85:1-85:4 - Nan Zhang, Chao Guo, Fei Li:

A Correction Method for Attitude Measurement in Steerable Drilling System. 86:1-86:5 - Joselito Medina-Marín, Maria Guadalupe Serna-Diaz, Juan Carlos Seck Tuoh Mora

, Norberto Hernández-Romero, Irving Barragán-Vite, Cinthia Montano-Lara:
Static Analysis for the No Termination Problem in Active Databases by Using Petri Nets Modelling. 87:1-87:7 - Hongrui Min, Chao Chen, Shixin Huang, Xiaorui Tian, Yongkui Yang, Zheng Wang:

Highly-accurate gesture recognition based on ResNet with low-budget data gloves. 88:1-88:6 - Xianbin Hong

, Sheng-Uei Guan, Prudence W. H. Wong, Nian Xue, Ka Lok Man, Dawei Liu, Zhen Li:
Lifelong Machine Learning-Based Quality Analysis for Product Review. 89:1-89:5 - Michael Chima Ogbuachi, Itilekha Podder

, Udo Bub, Murad Huseynli:
A Framework for Quantifiable Process Improvement through Method Fragments in Situational Method Engineering. 90:1-90:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














