


default search action
9th ICSAI 2023: Changsha, China
- Shaowen Yao, Zhenli He, Zheng Xiao, Wanqing Tu, Kenli Li, Lipo Wang:

9th International Conference on Systems and Informatics, ICSAI 2023, Changsha, China, December 16-18, 2023. IEEE 2023, ISBN 979-8-3503-8370-6 - Dihong Xie, Jin Wu

, Bo Zhao, Wenting Pang:
An Improved Gaussian-Mapping Algorithm for Edge Detection Based on FPGA. 1-6 - Jin Zhang, Fan Cao, Jianming Zhang, Ying Li, Sheng Wu:

Traffic Sign Recognition Based on Improved YOLOv5s. 1-6 - Dongdong Chen, Luyao Jiang, Yi Wang, Ke Gu:

Privacy-Preserving Arbitrary Hollow Polygon Geometric Range Query Scheme in Fog Computing-Based IoVs. 1-6 - Jiehuang Zhu, Xianfeng Liu, Jin Zhang, Sheng Wu:

Graph Neural Networks for Drug Response Prediction. 1-6 - Mini Han Wang

, Yang Yu, Zhiyuan Lin, Peijin Zeng, Haoyang Liu, Yunxiao Liu, Wenhan Hu, Xiaoxiao Fang, Xudong Jiang, Guangshun Chen, Guanghui Hou, Kelvin Kam Lung Chong, Xiangrong Yu:
Optimizing Real-Time Trichiasis Object Detection: A Comparative Analysis of YOLOv5 and YOLOv8 Performance Metrics. 1-5 - Jianbo Yuan

, Guoyi Li, Yitai Xu
, Wen Zhou
, Miao Yu
, Xiaomin Sun:
Adaptive Opinion Control Based on Two-stage Community Detection. 1-10 - QiaoLi Chen, LiWen Guo, YunChen Feng:

Agile development research based on software engineering to software testing. 1-3 - Zhenhuan He, Luxi Xue, Wenbin Yang:

Research on the Evaluation System for Train Service Plan in High-speed Railway based on Operation Efficiency and Effectiveness. 1-6 - Jing Wang

, Haowen Jiang, Yuqi Yang, Rundong Xin:
Biological Template Protection Based on Multikey Cryptographic Decomposition Features. 1-6 - Zhaoyang Li, Junying Chen, Hantao Huang, Xuze Dong:

Defect Detection in Computer Motherboard Assembly through Fusion of Multi-Scale Features and Attention Mechanisms. 1-7 - Qiangkui Leng, Zeqi Zhang, Xiangfu Meng:

Adaptive Ensemble with Density Peak and Random Forest for Class-Imbalance Learning. 1-6 - Siquan Hu, Jun Jia, Zhiguo Shi, Jun Zhao:

A Few-shot Classification Algorithm Based on Two-stream Frequency-Domain Information Networks. 1-6 - Luodi Zhao, Long Zhao:

An Augmented Two-stage Robust Adaptive Filtering Algorithm Based on GMWM for PPP/SINS. 1-6 - Wenjun Li, Shen Xu, Huan Peng, Weijun Liang:

Detection Of Bronchial Tuberculosis Using ASFF-Yolov5S Model. 1-6 - Yingbo Zhai:

Emotion Detection and Adjustment in Emails: A Solution for Teenagers in Mountainous Regions. 1-4 - Yunong Zhang

, Yuhao Fang:
Beginning and Ending Years of Technological Revolutions Estimated by Tabular Pattern Calculations as well as Further Thinking. 1-8 - Le Li, Hao Han, Ying Zhang, Zhe Liu, Jingfei Xue, Xuan Liu, Jingjiao Liang:

Optimal Scheduling of Integrated Community Energy System Considering Carbon Emission Reduction and Economic Viability. 1-9 - Qiangkui Leng, Wei Liu, Xiangfu Meng:

Spectral Clustering Augmentation Pseudo-Label Conditional Generation Adversarial Imputation Networks for Multivariate Time-Series Missing Data. 1-6 - Zihan Zhang, Xuesong Xie, Xiaoling Zhang:

Convolutional Neural Network Compression Method Based on Multi-Factor Channel Pruning. 1-6 - Shen JingBo, Liu Bo, Shen Yue:

An optimization method for improving the production efficiency of the pressure surface machine. 1-5 - Heming Chang, Shumin Han, Zhiguo Shi, Siquan Hu:

Limited Resources Multi-Object Tracking by Utilizing Motion Cue from the Meanshift Algorithm. 1-6 - Xin Ma

, Mingyue Li:
Exploration and Reflection on Precise Recommendation in Complex Information Environments: Boundaries, Challenges, and Future Prospects. 1-6 - Xueyang Zhong, Haihui Wang, Yanpu Chen:

Dynamic Residual Illuminating Network for Low-Light Image Enhancement. 1-6 - Wentao Deng, Lilin Chen, Yonglu Hong, Yanhua Liu:

An Abnormal Event Classification Model for Big Data Platforms Based on Semi-supervised Learning. 1-6 - Shumin Han, Heming Chang, Zhiguo Shi, Siquan Hu:

Facial Expression Recognition Algorithm Based on Swin Transformer. 1-6 - Yuchen Sun, Yanpiao Chen, Haotian Zhao, Shan Peng:

Design and Development of a Log Management System Based on Cloud Native Architecture. 1-6 - Da-Ming Zou, Yangkai Liu, Hang Lin, Zhen Qiu:

An Improved Algorithm for Foreign Objects Detection on Power Transmission Lines. 1-6 - Zeke Li, Haiwei Fan, Jiuyu Guo, Genyuan Dong, Shaokang Xu, Qiu Zhang, Yanhua Liu:

A Reliability Prediction Method for Power Communication Network Based on Node Importance. 1-6 - Yuanbin Wang:

Eight Points Geometric Constraint for Stereo Matching. 1-6 - Delia Mitrea, Vlad Timu, Cristinel Mihai Mocan, Sergiu Nedevschi, Andrei-Vlad Florian, Mihai Adrian Socaciu

, Radu Badea:
Liver Tumor Segmentation From Computed Tomography Images Through Convolutional Neural Networks. 1-6 - Han Xiao, Jinting Wang:

Application Analysis of Data Mining technology in Internet Information Retrieval. 1-6 - Guanyu Zhu

, Thelma Domingo Palaoag:
Implementation and Evaluation of Smart Agriculture System based on Big Data Analytics. 1-4 - Han Xiao, Jinting Wang:

Analysis of Blockchain Technology to Enhance Logistics Supply Chain in the Context of Internet. 1-6 - Jieyu Han:

Using machine learning models to predict win rate of NBA teams. 1-4 - Min Long, Qihuan Wang, Le-Bing Zhang, Jun Zhou:

CALP-FD: Cross Attention-Based Facial Landmarks Prompt for Face De-Morphing. 1-6 - Yunong Zhang

, Yuhao Fang:
WZ Algorithms from AS Kind to MD One Attempted to Predict Solar Minimum. 1-7 - Jiming Sa, Hui Xu:

Scheduling System for Spinning Workshop Based on Improved Particle Swarm Optimization Algorithm. 1-6 - Yijun Tan, Yini Zhou, Xi Cheng:

FpRE:Front-prompt based dependency enhanced Few-shot Relation Extraction. 1-5 - Bingjun Qin, Zhenhua Huang, Guibing Guo:

Meta Learning Framework for Improved Long-tail Item Recommendation. 1-6 - Lun Li, Xuebo Zhang, Yang Wang, Chenxu Qian, Minghui Zhao:

Reinforcement Learning Methods for Fixed-Wing Aircraft Control. 1-8 - Shiming He, Sikai Zeng:

An Integrated Long Short-Term Memory Based Online Log Anomaly Detection. 1-6 - Shiming He, Zesheng Qu, Bowen Chen:

Unsupervised Log Anomaly Detection Based on Pre-training. 1-6 - Yunong Zhang

, Rifeng Yang:
Gradient-Zhang (GZ) Dynamics Coping with UDSTDLE (Under-Determined System of Temporally-Dependent Linear Equations). 1-8 - Reggie Davidrajuh:

A New Closeness Centrality Measure based on Minimum Weight Spanning Tree. 1-6 - Tatsuki Ando, Kazuaki Ando:

Factuality Analysis of SNS Posts Containing Diverse Symptom Expressions for Public Health Surveillance. 1-5 - Wenjun Li, Yanfan Li, Huan Peng, Yongjie Yang, Weijun Liang:

Mask R-CNN assisted diagnosis of spinal tuberculosis. 1-6 - Yan Zhao, Qiang Wang, Xiaofeng Chen:

Optimizing Blockchain Broadcast with Node-Cluster Tree Routing. 1-6 - Jiming Sa, Xuecheng Zhang, Chi Zhang, Yuyan Song, Liwei Ding, Yechen Huang:

Point Cloud Pose Alignment Based on Improved Nearest Point Iteration. 1-6 - Reggie Davidrajuh:

Generating Random Petri Nets for GPenSIM environment. 1-6 - Qiangkui Leng, Xuezi Sun, Xiangfu Meng:

A Radial-Based Mixed sampling method for imbalanced data classification. 1-6 - Zhaojia Han, Kan Li, Shaojie Qu:

A Temporal Action Detection Model Based on Deep Reinforcement Learning. 1-7 - Menghan Fu, Zhuo Jiang, Jie Su, Ling Zhou:

Internet Financial Risk Assessment Based on Hybrid Neural Network Algorithm. 1-6 - Yunong Zhang

, Jiawei Chen, Ting Qiu:
Year and Confidence-Interval Prediction of Possible GRCT (Global Reserve Currency Transition) via Table Pattern Calculations (TPC) Method. 1-8 - Kang Shi, Jun Yang, Zi Jun Liang, Yu Qi Li, Rui Han Wang:

Queue Length Prediction Method of Short-linked Intersections Based on Long Short-Term Memory. 1-6 - Boran Wang

, Yue Xiao:
Reinforcement Learning based End-to-End Control of Bimanual Robotic Coordination. 1-7 - Lihua Ye:

A Discriminative Feature Learning Approach for Remote Sensing Image Scene Classification. 1-5 - Wenjun Li, Jiazhi Liu, Huan Peng, Weijun Liang:

Prediction of Pulmonary Tuberculosis with Hemoptysis based on Deep Learning. 1-6 - Yang Yang, Yi Zhang, Chengli Zhu:

Improved Job Scam Detection Methods Using Machine Learning and Resampling Techniques. 1-5 - Naichao Chang, Hui Cui, Wenjin Xie:

Optimal Dispatching of Power System Considering Source-load Uncertainty and Pricing of Flexible Ramping Products. 1-6 - Liang Chen:

Mobile Fighter Plane Game Manipulation: Touch-based Method vs. Camera-Based Method. 1-5 - Zhuo Jiang, Jie Su, Ling Zhou:

Credit default prediction based on genetic algorithm improved neural network. 1-5 - Yuanfei Yuan, Liangying Wang, Qi Zhou, Wen Xiao, Lijin Wang, Yiwen Zhong:

Cuckoo Search Algorithm with Normal Distribution and Its Application in Lychee Image Segmentation. 1-7 - Marcos A. Lévano

, Billy Peralta, Juan Cid:
A Portfolio Competency Assessment Approach: Case Study, an Engineering Degree. 1-6 - Wenfeng Tian, Hui Deng, Zhen Jing, Congcong Li:

Research on the characteristic modeling of substation equipment of power Internet of things. 1-5 - Mingwei Yang, Yanhua Liu, Hong Chen, Jiefei Lin, Haoqiang Lin:

An Anomaly Detection Method for Nonlinear Industrial Process Using Sparse Stacked Denoising Autoencoder. 1-6 - Wei Li, Haobo He, Guang Li, Li-Dan Kuang

, Jin Zhang:
A Method for Constructing an Olfactory Dataset Based on fNIRS. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














