


Остановите войну!
for scientists:
5th ICCCS 2020: Shanghai, China
- 5th International Conference on Computer and Communication Systems, ICCCS 2020, Shanghai, China, May 15-18, 2020. IEEE 2020, ISBN 978-1-7281-6136-5
- Kun Yue, Jiahui Wang, Xinbai Li, Kuang Hu:
Representation-Based Completion of Knowledge Graph with Open-World Data. 1-8 - Xingzhe Li, Changbao Yang, Zhiguo Meng, Haobin Zhang:
Research on Alteration Information Extraction Based on Sentinel-2A Satellite Data : Taking the Beiya Gold Mine as an example. 9-14 - Xiaojian Xu, Charlie Shay:
Optimal Training Data Selection in Active Learning for Discrimination and Classification. 15-19 - Jianli Xiao, Hongyu Wang:
Traffic Index Cloud Maps for Traffic Flow Analysis with Big Traffic Data. 20-23 - Lijing Niu, Chenhao Yang, Yongxing Du, Ling Qin, Baoshan Li:
Cattle Disease Auxiliary Diagnosis and Treatment System Based on Data Analysis and Mining. 24-27 - Fahimeh Nezhadalinaei, Lei Zhang, Reza Ghaemi, Faezeh Jamshidi:
Data Classification and Weighted Evidence Accumulation to Detect Relevant Pathology. 28-34 - Kechang Qian, Youchen Fan, Dapeng Xiong, Jie Qiang:
A Fusion Method of Multivariate Measurement Data Based on Principal Component Estimation. 35-39 - Jayshree Ghorpade
, Balwant A. Sonkamble:
Predictive Analysis of Heterogeneous Data - Techniques & Tools. 40-44 - Yiran Liu, Wanjiang Han, Xiaoxiang Wang, Qi Li:
Oversampling Algorithm Based on Spatial Distribution of Data Sets for Imbalance Learning. 45-49 - Zeng Rui, Hongli Yin, Jinyan Cai:
Research on the Model of Missing Information Completion of Telecom Customers Based on Factor Analysis and Data Mining. 50-53 - Chen Zhengbo, Liu Xiu, Xing Yafei, Hu Miao, Ju Xiaoming:
Markov Encrypted Data Prefetching Model Based On Attribute Classification. 54-59 - Xiliang Wang, Gansen Zhao, Xinming Wang, Xiaocong Zhou:
Translation Of DDL And DML For Constructing Flexible Schemas In Saas Applications. 60-66 - Zhengwen Zhang, Fengning Wang, Cheng Zhong, Huizhuo Ma:
Grid Terminal Data Security Management Mechanism Based On Master-Slave Blockchain. 67-70 - Jawwad Latif, Pouyan Mehryar, Lei Hou, Ali Zulfiqur:
An Efficient Data Compression Algorithm For Real-Time Monitoring Applications In Healthcare. 71-75 - Yihong Long, Feng Xiong:
Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption. 76-81 - Xingchuan Liu, Lin Han, Jiang Zhu, Zhiwei Xu:
Fast Inverse-Free Generalized Sparse Bayesian Iearning Algorithm. 82-86 - Xi Qian, Jiufen Liu, Chunxiang Gu, Yonghui Zheng:
An Improved BKW Algorithm For LWE With Binary Uniform Errors. 87-92 - Guodong Li, Qiu Zhang, Rongrong Zheng, Chenhui Wang:
A Fault Analysis Method Based on Text Clustering. 93-98 - Yi Sun, YinXiao Liu, ZhongYao Wang, BaoLong Niu:
Automating Multi-element Subspace Exploration via Reinforcement Learning. 99-103 - Qinghua Li, Hailong Ma, Zhao Zhang, Chao Feng:
An Effective Nuclear Extraction Mask Method for SVM Classification. 104-108 - Patcharanikarn Pongthanoo, Wararat Songpan:
Feature Selection and Reduction Based on SMOTE and Information Gain for Sentiment Mining. 109-114 - Thomas Gabor, Sebastian Zielinski, Christoph Roch, Sebastian Feld, Claudia Linnhoff-Popien:
The U Q Platform: A U nifed Approach To Q uantum Annealing. 115-119 - Ren Qing-Dao-Er-Ji, Qiu Ying, Li Tiancheng:
Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia. 120-124 - Baoyou Zheng, Zhiping Wang:
PATS: A New Neural Network Activation Function with Parameter. 125-129 - Ziqian Jia, Xingjun Wang, Xiaoqing Zhang, Mingkai Xu:
Automatic Arousal Detection Using Multi-model Deep Neural Network. 130-133 - Wei Cheng, Qiyue Yin, Junge Zhang:
Opponent Strategy Recognition In Real Time Strategy Game Using Deep Feature Fusion Neural Network. 134-137 - YongJian Bao, Hao Yang, Zhongliang Yang, Sheng Liu, Yongfeng Huang
:
Text Steganalysis with Attentional L STM-CNN. 138-142 - Junchao Dong, Feijuan He, Yunchuan Guo, Huibing Zhang:
A Commodity Review Sentiment Analysis Based on BERT-CNN Model. 143-147 - Atchara Mahaweerawa, Chatree Nilnumpetch, Pawalai Kraipeerapun:
Applying Stacked Generalization with the Difference of Truth and Falsity Data to Predict Student's Performance. 148-152 - Yang Zheng, Yin Chunlin, Fang Zhengyun, Zhao Na:
Trust Chain Model and Credibility Analysis in Software Systems. 153-156 - Li Wei, Wang Yong, Hou Huijuan, Xiaoqi Zhao:
Software Quality Evaluation Model of Smart Electricity Meters Based on CMMI. 157-161 - Yanwei Wu, Ru Wang, Xiaohua Xu:
A Certificate Pin BGP Protocol: CP-BGP. 162-166 - Zhibin Guan, Xiaomeng Wang, Wei Xin, Jiajie Wang, Li Zhang:
A Survey on Deep Learning-Based Source Code Defect Analysis. 167-171 - Nabil Almashfi, Lunjin Lu:
Code Smell Detection Tool for Java Script Programs. 172-176 - Sayed Ehsanullah Ahmady, Osamu Uchida:
Telegram-Based Chatbot Application for Foreign People in Japan to Share Disaster-Related Information in Real-Time. 177-181 - Hui Cao, Jian Kang:
Study on Improvement of Recommendation Algorithm Based on Emotional Polarity Classification. 182-186 - Sun Lei:
The Reconstruction of the Historical Moving Path for Certain Lost Agent in One Multi-mobile Intelligence Agent Group. 187-190 - Hitendra Shankarrao Khairnar, Balwant A. Sonkamble:
Aggregated Time Series based Vehicular Traffic Path Recommendation. 191-195 - Lei Sun, Guizhen Wang, Zhiqiang Zhao:
Synchronization Voting Method in Reconstruction of Historical Moving Path for Certain Lost Agent in One Multi-mobile Intelligence Agent Group. 196-200 - Yunjie Fang, Jingcheng Ye, Haoyu Wang:
Realization of Intelligent Invigilation System Based on Adaptive Threshold. 201-205 - Yumeng Zhen, Peng Cao, Liuping Feng, Fangfang Chen:
Research on Pseudo-Random Noise Information Identification Technology of Printed Anti-Counterfeiting Image Based on Deep Learning. 206-209 - Guodong Li, Jinyi Sun, Xin Guo:
An ICT System Fault Analysis Technology Based on Text Classification and Image Recognition. 210-214 - Songchenchen Gong, El-Bay Bourennane, Junyu Gao:
Multi-feature Counting of Dense Crowd Image Based on Multi-column Convolutional Neural Network. 215-219 - Yiwen Ou, Zhiming Cai
, Jian Lu, Jian Dong, Yufeng Ling:
Evaluation of Image Feature Detection and Matching Algorithms. 220-224 - Chengli Hou:
A study on IMU-Based Human Activity Recognition Using Deep Learning and Traditional Machine Learning. 225-234 - Xiaolei Zhao, Yang Yi, Zemin Qiu, Qingqing Zeng:
Feature Retrieving for Human Action Recognition by Mixed Scale Deep Feature Combined with Attention Model. 235-239 - Huangqiang Fang, Yulin He, Wanyang Xu, Yanyan Xu, Dengfeng Ke, Kaile Su
:
A Generalized Denoising Method with an Optimized Loss Function for Automated Bird Sound Recognition. 240-245 - Chunlan Jiao, Jianbin Liu:
Research on Procedure Pattern Recognition Method Based on Conditional Constraints. 246-250 - Chen Chen, Ping Lu, Siqi Wang, Zijie Li:
PoseNet Based Acupoint Recognition of Blind Massage Robot. 251-255 - Shinnosuke Kaida, Pornprom Kiawjak, Kousuke Matsushima:
Behavior Prediction Using 3D Box Estimation in Road Environment. 256-260 - PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu:
Batch Target Recognition Count under Complex Conditions Based on Att-Unet. 261-265 - Jin Wei, Chen Ying:
Aggregative Adversarial Network for Still-to-Video Face Recognition. 266-270 - Liping Liu, Guangli Wu, Zhilong Yang:
Research on Terror Video Identification Technology Based on Multi-instance Learning. 271-276 - Guimei Qi, Li Du, Min Zhi, Qing Yong:
Driving State Recognition for Ego-central Driving Videos. 277-280 - Guangli Wu, Leiting Li, Zhenzhou Guo, Chengxiang Wang, Yanpeng Yao:
Video Summarization Based on ListNet Scoring Mechanism. 281-285 - Hang Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei:
Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation. 286-290 - Wei Wang, Jianhua Chen:
Hybrid Side Information Generation Algorithm Based on Probability Fusion for Distributed Video Coding. 291-295 - Hao Li, Weimin Lei, Wei Zhang:
QEVC: Quality Enhancement-Oriented Video Coding. 296-300 - Tingting Lu, Lei Zhang:
Analysis and Application Based on GTF Infrared and Visible Image Fusion. 301-308 - Dongyang Li, Guiying Tang, Li Zhao, Xiaoqin Zhang, Xiuzi Ye:
Single I mage Haze Removal Based on Concentration Scale Prior. 309-313 - Huazhi Dong, Yushan Qian, Linlin Wang, Pei Lu:
The Application of Image Style Transformation Based on GAN in the Intelligent Mobile Terminal. 314-318 - Kai-Xuan Bao, Qi-Pei Qian, Ya-Xuan Yang:
Micro Distortion Image Compression Based on Huffman Encoding. 319-323 - Qiang Zhou, Chaobang Gao, Wen Yang, Yudie Zhong:
A New Fractional Differential Mask Based on Interpolation Operation and Its Application in Image Enhancement. 324-328 - Wen Qian, Chao Zhou, Dengyin Zhang:
CIASM-Net: A Novel Convolutional Neural Network for Dehazing Image. 329-333 - Haishan Zhang, Xiaonan Liu:
Cascading Framework for Multi-level Image Quality Evaluation. 334-337 - JunHong Fu, Kun Zhang, Peijian Zhang:
Poorly Differentiated Colorectal Gland Segmentation Approach Based on Internal and External Stress in Histology Images. 338-342 - Zheng-Ming Gao
, Juan Zhao, Su-Ruo Li, Ru-Rong Hu:
The Improved Equilibrium Optimization Algorithm with Tent Map. 343-346 - Yunchao Zhang, Ning Xu, Huiming Chen, Wong Hing Lam, Xin Zhang, Tian Qiu:
A Robust and High-performance White Blood Cell Segmentation Algorithm. 347-351 - Juan Zhao, Zheng-Ming Gao
:
The Improved Equilibrium Optimization Algorithm with Levy Flight. 352-355 - Yanwen Wu, Lei Zhang:
Spatio-Temporal Fish-Eye Image Processing Based on Neural Network. 356-362 - Xuhao Jiang, Yifei Xu, Pingping Wei, Zhuming Zhou:
CT Image Super Resolution Based On Improved SRGAN. 363-367 - Tang Sisi, Yaping Wan:
Finding Multiple Variables Causal Dispositions In Images. 368-372 - Un-Sook Choi, Sung Jin Cho, Sung Won Kang:
High Speed Color Image Encryption Using Pixel Shuffling With 1-D MLCA. 373-377 - Yujie Bai, Shuang Yang, Ying Wu, Yongcan Chen, Shiqi Pan, Yansong Deng:
Expansible Surface Waste Cleaning Robot. 378-383 - Rui Li, Yongfu Zhang, Lihui Peng, Xinghe Liao:
An Image Reconstruction For Electrical Capacitance Tomography Using Parametric Level Set. 384-390 - Mingwan Zhu, Linlin Zhu
, Yu Han, Xiaoqi Xi, Lei Li, Bin Yan:
Geometric Artifact Evaluation of X-ray Computed Tomography Images Based on Convolutional Neural Network. 391-394 - Guoqing Deng, Yangguang Zhao, Long Zhang, Zhigang Li, Yong Liu, Yi Zhang, Bin Li:
Image Classification and Detection of Cigarette Combustion Cone Based on Inception Resnet V2. 395-399 - Zijie Li, Kun Zhang, Jiangguo Wu, Ping Lu:
External Thread Measurement Based on ResUnet and HMM. 400-403 - Jiming Sa, Zhihao Li, Qijun Yang, Xuan Chen:
Packaging Defect Detection System Based on Machine Vision and Deep Learning. 404-408 - Ziyue Liu, Tomoya Chihara, Joo Kooi Tan:
Ego-Posture Estimation for a Pedestrian Using a Monocular Wearable Camera. 409-412 - Jiandong Cui, Andrew Beng Jin Teoh:
Deep Index-of-Maximum Hashing for Face Template Protection. 413-418 - Yang Liu, Osamu Uchida, Keisuke Utsu:
A Proposal on Disaster Information and Rescue Request Sharing Application Using Sina Weibo. 419-423 - Qing Li, Yonghui Ju, Chang Zhao:
Classification of Discrete Sequential Protocol Messages Based on LSTM Network and Transfer Learning. 424-430 - Takuya Kondo, Osamu Uchida:
Real-Time Disaster Information Providing System for Inducing Risk Perception. 431-435 - Taoyong Li, Yongxiang Liu, Xiaohong Diao, Linru Jiang, Jing Zhang:
Research on Distributed New Energy Information Interconnection Mode Based on Blockchain Consensus Mechanism. 436-441 - Hiroya Yamada, Yoshitaka Kajita, Sachi Tajima, Keisuke Utsu, Osamu Uchida, Yuji Murakami:
Effects and Issues of the Disaster Information Tweeting and Mapping System for Residents. 442-446 - Chao Lu, Shaofu Lin, Xiliang Liu, Hui Shi:
Telecom Fraud Identification Based on ADASYN and Random Forest. 447-452 - Meelis Kitsing
:
Scenarios for Digital Platform Ecosystems. 453-457 - Azin Moradbeikie, Kamal Jamshidi, Ali Bohlooli
, Jordi Garcia
, Xavi Masip-Bruin:
A Fog Based Approach for Hazards Differentiation in an IIoT Scenario. 458-462 - Wang Run, Shi Shudong:
Security Analysis of Home Agent Time-Stamped Binding Update Based on CS Logic. 463-466 - Zhe Sun:
A Security Reinforcement Method for Intranet Computer Terminal. 467-471 - Xin Jiang, Fan Yang, Yuhan Dong:
Impact of HPA Nonlinearity on Artificial Noise Assisted Secure Communication Systems. 472-476 - Abdallah Tubaishat, Mariam Al Jouhi:
Building a Security Framework for Smart Cities: A Case Study from UAE. 477-481 - Feng Liu, Wang Xin:
Implementation of Distributed Crawler System Based on Spark for Massive Data Mining. 482-485 - Yunhe Cui, Qing Qian:
MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking. 486-490 - Md Delwar Hossain
, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. 491-497 - Chenguang Wu, Jizhao Lu, Wencui Li, Huiping Meng, Yinlin Ren:
Master-slave Blockchain Based Cross-domain Trust Access Mechanism for UPIOT. 498-503 - Jingcheng Ye, Yunjie Fang, Xingda Bao:
Fast Detection Model of Untrusted Nodes in Fog Computing Based on CGAN. 504-509 - Rongyong Zhao, Yan Wang, Qiong Liu, Daheng Dong, Cuiling Li:
Knowledge Acquisition Model for Stability Situation Judgement Used in Crowd Evacuation. 510-514 - Wang Jun-Feng, Lin Chuan-Wen, Hu Xue-You, Liu Gang:
Three-Dimensional Simulation of Nd: YAG Crystal Growth Based on Computational Fluid Dynamics Analysis Software. 515-519 - Changdao Du, Iman Firmansyah, Yoshiki Yamaguchi:
High-Performance Computation of LGCA Fluid Dynamics on an FPGA-Based Platform. 520-525 - Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-Chu Chan:
Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups. 526-532 - Peng Pengfei, Li Yating, Zhou Linru:
Research on Interactive Collaborative Decision-Making Method of Equipment Support Task Planning. 533-537 - Dunnan Liu, Lingxiang Wang, Mingguang Liu, Mi Liu, Junhui Li, Haiming Zhou:
Research on Operation Strategy of Power Market Subject under The Background of Global Energy Interconnection. 538-542 - Chunhua Chen, Fengsong Zhou, Bin Chu, Xiangqiang Zeng, Min-si Ao:
A Novel Evaluation Approach for the Elevation Datum Product. 543-546 - Junhui Li, Haiming Zhou, Xiao Han, Jing Zhang, Rong Yu, Yujie Ma:
Research on Multi-energy Interaction Mode and Value System under the Background of Energy Internet. 547-551 - Huayan Pei, Guanghui Yan, Huanmin Wang:
Monetary Punishment Promotes Cooperation in Complex Networks. 552-556 - Toshiya Kawato, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura:
Proposal of Distributed e-Learning System Using Idle Resources. 557-561 - Wu Yanhua, Ma ZhiQiang, Zhao Zhengyang, Cheng Zhibo:
Dual Preference Matrix Collaborative Filtering Algorithm and Its Application in Railway B2BE-commerce Platform. 562-569 - Quanyv Wang, Panpan Fu, Shouzhen Zhang:
A Comparison of Concatenated Polar Codes with Different Interleaving and Decoding Schemes. 570-574 - Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang:
Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard. 575-579 - Xinyue Wang, Tao Peng, Peiliang Zuo, Xing Wang:
Spectrum Prediction Method for ISM Bands Based on LSTM. 580-584 - Shuangyin Ren, Gaigai Tang:
A Reactive Traffic Flow Estimation in Software Defined Networks. 585-588 - Wei Hu, Suiyan Geng, Xiongwen Zhao:
Mm-Wave 60 GHz Channel Fading Effects Analysis Based on RBF Neural Network. 589-593 - Lerson Kirasamuthranon, Paramote Wardkein, Jeerasuda Koseeyaporn:
Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator. 594-598 - Yinhang Zhang, Huiyuan Yang:
High Speed MLSD Equalization for Serial Link. 599-603 - Xinyuan Dong, Wen Chen:
Research and Implementation of Dual-Frequency Precise Point Position Based on U-blox F9P. 604-608 - Jietai Wang, Xiaoniu Yang, Zhenxing Luo:
An Indoor Wi-Fi Positioning Approach optimized by Virtual Node. 609-612 - Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng:
Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System. 613-617 - Yonglin Ju, Zhiwen Liu, Yougen Xu:
A Nyström-Based Method for Incoherently Distributed Source Localization. 618-622 - Shuang Cao, Yulong Wang, Xiaoxiang Wang, Qi Li:
A Rapid Assessment Method for Seismic Intensity Area and Affecting Field Direction Using Mobile Phone Base Stations. 623-627 - Lu Wang
, Jingwen Zhang, Ce Sun, Hanxiao Yu, Haoyu Wang:
Adaptive Determination of PMI Feedback Period for FDD PDSCH in 5G eMBB Scenario. 628-634 - Jing Yang, Hui Li:
Deep Learning Based Detection and Channel Tracking for MIMO Systems. 635-639 - Yachang Hou, Xiangning Chen, Kaiyan Du:
Comparison and Analysis of SFO Estimation Methods Based on OFDM. 640-644 - Haiying Yuan, Tong Zheng, Kai Zhang, Yichen Wang:
An Efficient Schedule Synthesis Method based on Constraint Programming Technology for Time-Triggered Ethernet. 645-649 - Si Thu Aung, Thandar Thein:
Internet Traffic Categories Demand Prediction to Support Dynamic QoS. 650-654