


default search action
DSIT 2021: Shanghai, China
- DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23 - 25, 2021. ACM 2021, ISBN 978-1-4503-9024-8

- Fuming Chen, Chuantao Li, Fulai Liang, Jianqi Wang:

A New Algorithm on 94 GHz Asymmetric Antenna Bio-radar Conducted Speech Enhancement. 1-4 - Haipeng Zhang, Ningning Lu, Jie Li, Ruiliang Song:

Time Analysis of IoT Node Based on Ambient RF Energy Harvesting for Ultra-low Power Application. 5-8 - Haixia Li, Li Yan:

A Temporal RDF Model for Multi-grained Time Information Modeling. 9-14 - Jia-Tao Huang, Hong-Liang Sun, Xiao-Fei Chen, Xiao-lin Liu, Jie Cao:

An Iterative Deviation-based Ranking Method to Evaluate User Reputation in Online Rating Systems✱. 15-21 - Zhenni Ni, Zhizhen Yao, Yunmei Liu, Yuxing Qian:

Dynamic user needs modeling based on social support in online health communities. 22-27 - Bin Sun, Jing Xu, Wei Hong, Xiaocong Li:

A novel detection algorithm for radar signal under non-Gaussian clutter. 28-31 - Wei Ge, Xin Luo, Ran Tao, Youqun Shi:

Human Fall Detection Algorithm Based on Mixed Attention Mechanism. 32-37 - Zheng Song, Jianguo Yu, Yue He, Jikai He:

Leaky Training: A Robustness Improvement Scheme for Autoencoder Based Network Intrusion Detection System under Online Learning. 38-43 - Beini Jia, Xin Luo, Ran Tao, Youqun Shi:

Surface Defect Detection of Aluminum Material Based on HRNet Feature Extraction. 44-48 - Yu Fan, Chin-Ta Chen, Chih-Chung Yang:

Cantonese speaker recognition system based on EM algorithm in noisy environments. 49-54 - Jianhua Li, Chenxi Zhang, Chun-li Lei, Hong Zhang, Lin-long Chen:

Product Recommendation Algorithm for Score Prediction Based on Joint Feature Vector Extraction. 55-61 - Haiwen Wei, Na Liu, Qian Zhang, Chuanfeng Yang, Junjian Guo, Shuo Wang:

Research on 3D Visualization technology of Dual-polarization Weather Radar Products. 62-68 - Yiming Fei, Xiaoyue Yuan, Mengmeng Ren, Shuhai Fan:

Research on Horizontal Integration Scheme for Mass Customization Data Quantity and Quality Problem: Horizontal Integration Scheme for MC. 69-73 - Xin Pan, Bing Zhu, Yanbing Liu, Feijie Huang:

A LSTM-cBiGAN based hybrid sampling method for time series customer classification. 74-77 - Zhu Fu, Weike Ding, Peng Guan, Xuhui Ding:

Topic Mining of Modern Poetry For Digital Humanities: Case Study of Gu Cheng Poetry. 78-83 - Peng Liu, Liang Gui:

Structural Analysis of Collaboration Network in OSS Communities∗. 84-91 - Qiuyun Cheng, Guozheng Yang, Jingju Liu, Yongheng Zhang:

Research on Network Security Issues from the Perspective of Multilayer Networks. 92-97 - Bin Lu, Lijuan Zhou, Shudong Zhang, Xin Chen, Weidong Feng:

Detection of small objects in complex long-distance scenes based on Yolov3. 98-102 - Zichen Zhang, Yong Shao, Yuliang Shi, Changshun Yan:

Research on Traffic Data Resource Sharing Model Based on Blockchain. 103-108 - Pilita A. Amahan

, Mia V. Villarica, Albert A. Vinluan
:
Technical Analysis of Twitter Data in Preparation of Prediction using Multilayer Perceptron Algorithm. 109-113 - Pilita A. Amahan

, Mia V. Villarica, Albert A. Vinluan
:
Analysis of Membership Function in the Implementation of Neuro-Fuzzy System for Prediction of Depressive Lexicons. 114-118 - Chungang Gao, Yongjie Wang, Xinli Xiong:

Comparison of Defense Effectiveness between Moving Target Defense and Cyber Deception Defense. 119-124 - Qingyang Wu, Xu Cheng, Erxin Sun, Chengpeng Deng:

Collaborative filtering algorithm based on optimized clustering and fusion of user attribute features. 125-129 - Chang Su, Yining Gang, Chengming Jin:

Genetic Algorithm based Edge Computing Scheduling Strategy. 130-134 - Qing Hu

, Wenshuo Han, Hao Zhang:
Ship identity authentication security model based on Blockchain. 135-142 - Zanyu Hou, Xinting Cui, Qiushuang Shi:

Prediction of Steel Production Based on the Combination of XGBOOST and LassoLars. 143-147 - Guangjie Li, Jiajun Ma, Qiang Zhan, Dandan Wu, Xiong Wei, Xu Wang, Jiancun Zuo:

Detection Technology of Satellite Navigation Spoofing Signal. 148-153 - Tilei Gao, Jinyu He, Tengyang Fan, Feng Ma:

Research on dynamic evolution method of software service based on trusted agent. 154-158 - Zhe Wang, Kangfeng Zheng, Qingbiao Li, Maonan Wang, Xiujuan Wang:

Adversarial Text Generation for Personality Privacy Protection. 159-165 - Feng Ma, Ying Yang, Tilei Gao:

A new method of similarity measure for Vague Sets. 166-169 - Quang-Vinh Dang

, Thai-Ha Pham, My-Linh Tran, Minh-Hung Dang, Quoc-Khanh Nguyen, Anh-Nguyen Nguyen:
Towards an automatic interior design system using GAN. 170-172 - Zhong Zheng, Guixia Kang:

Model Compression with NAS and Knowledge Distillation for Medical Image Segmentation. 173-176 - Yaoduo Zhang

:
Sa-HarDNeSt: A Self-Attention Network for Polyp Segmentation. 177-182 - Jiting Li, Yu Cheng, Tao Wang, Hao Wang:

PLEAS: A Decision Support System for Personnel Evaluation and Selection. 183-190 - Haoyuan Zheng, Yonghui Zhang, Daxiang Huang:

Load Balancing RPL Routing Protocol Based on Non-uniform Clustering. 191-195 - Jiajun Ma, Guangjie Li, Qiang Zhan, Dandan Wu, Xiong Wei, Xu Wang, Qiang Zhao, Jiancun Zuo:

Surface roughness detection based on image analysis. 196-200 - Rabranea Bqa, Samia Asloob Qureshi, Tanzeela Shakeel

, Ateeqa Naseer:
Reverse Engineering on Planar Contours: An Algorithmic Review. 201-207 - Li Wang, Taijun Li:

Research on Image Feature Extraction Method Fusing HOG and Canny Algorithm. 208-211 - Dandan Wu, Yue Peng, Qiang Zhan, Jiajun Ma, Guangjie Li, Xiong Wei, Xu Wang, Jiancun Zuo:

Text recognition technology for natural scenes. 212-217 - Wendian Zhao, Yongjie Wang, Xinli Xiong, Mingzhi Wang:

DSCT: A Damage Strategy for Inter-domain Routing System Considering Cost and Based on TOPSIS. 218-225 - Shigeo Akashi, Yao Tong:

A Vulnerability of Dynamic Network Address Translation to Denial-of-Service Attacks. 226-230 - Shudong Li, Xi Kang, Yankun Feng, Gang Liu:

Detection method for individual pig based on improved YOLOv4 Convolutional Neural Network. 231-235 - Jiajun Hu, Weijie Shang, Hanqi Lou:

Research on AGV Path Based on Optimal Planning. 236-240 - Chun-yan Nie, Hui-yu Wang, Ru-jun Fan, Xin-lei Ruan, Cheng-jin Yang, Min-shi Che:

Research and Implementation of Emotion Recognition Platform Based on Multiple Physiological Signals. 241-245 - Nirmalya Thakur

, Chia Y. Han:
Pervasive Activity Logging for Indoor Localization in Smart Homes. 246-255 - Qian Cao:

Research on the development trend of China's integrated circuit industry based on patent measurement∗. 256-259 - Yan He, Longwei Sun, Xiaoping Li, Hongfei Nie:

Study on Temperature Control Model and Algorithm for the Discharge Cavity of Excimer Laser. 260-267 - Xinyuan Niu, Wenguang Zheng, Yingyuan Xiao, Qian Wang:

Short text similarity computation method based on feature expansion and Siamese network. 268-272 - Yifei Hu, Shiwei Yang, Anjie Shi:

Research on Transferable Patent Recognition Based on Machine Learning. 273-278 - Ling Xu, Song Chen, Yue Liu:

A Study to Investigate the Characteristics and Influencing Factors of the Leisure Life of Females: - - Based on Survey Data of Beijing Residents' Social Lives. 279-285 - Qin Qin

, Bing Lu, Xin Wang:
NOR Flash test system based on FPGA. 286-290 - Ke Jia:

Method of Improving Semantic Representation of Word Embedding. 291-294 - Ke Jia:

Machine Learning on Mining Potential Adverse Drug Reactions for Pharmacovigilance. 295-298 - Huiying Jiang, Maode Ma:

Binary Tree-Based Interest Flooding Attack Detection and Mitigation in NDNs. 299-304 - Yongkang Zhang, Peng Cao:

A Simple Algorithm for Quickly Estimating the Sharpness of Mobile Phone Images. 305-309 - Yanhui Chen:

A study on the cognitive efficiency of visual attention in pop-up ads based on eye-movement experiments. 310-316 - Hui Wang, Yu Zhang:

Research on the design of chopsticks for dining reminders based on HSI color space recognition. 317-322 - Peng Li, Haibin Xie, Zhiyong Ding:

An evolutionary adaptive clustering algorithm. 323-327 - Zehong Zheng, Shangping Zhong, Kaizhi Chen:

Decision-making Method of Futures Trading Using Dictionary-based Early Classification of Time Series. 328-333 - Sadeq Darrab, David Broneske, Gunter Saake:

MaxRI: A method for discovering maximal rare itemsets. 334-341 - Hong-wei Wu, Hui Guan:

The mechanism of brand reputation on consumer purchase intention in live banding. 342-347 - Meijun Ning, Hui Lv, Dongxu Zhang, Luoru Ma:

Analysis of Literature Big Data on Factors Influencing Corporate Annuity Participation Decision and Its Logic in China. 348-354 - Xiaojian Li, Hailan Wang, Jiajia Zhang, Huang Liang, Fu Liao, Yiyi Jiang:

A Change-point Wavelet Method to Hard Drives Running Status. 355-360 - Wenda Ma, Hui Xie:

Research on Prediction Algorithm of Vehicle Trajectory in Front Based on Driving Intention Classification. 361-367 - Xinru Chen, Pengjun Zhai, Yu Fang:

High utility pattern mining based on historical data table over data streams. 368-376 - Fachao Li, Shijie Ma, Chenxia Jin

:
Research on Data Consistency Detection Method Based on Interactive Matching. 377-382 - Junmin Jia, Fangyuan Cheng:

Feature Extraction and Classification Recognition of Electroencephalogram Signals Based on Convolutional Neural Network. 383-388 - Keyang Wang, Yiping Zeng, Fanyu Meng, Feiyu

, Lili Yang:
Comparison between Calculation Methods for Semantic Text Similarity based on Siamese Networks. 389-395 - Fangyuan Cheng, Junmin Jia:

Quantitative interactive investment algorithm based on machine learning and data mining. 396-401 - Peng Wang, Jing Yang, Jianpei Zhang:

Location Prediction for Indoor Spaces based on Trajectory Similarity. 402-407 - Jun Wang, Wei Zhang, Jinghong Tian, Mingtong Liu, Shengda Zhang:

Tracking and decision of outsourcing service for auto parts. 408-413 - Hao Huang, Lihua Zhou, Yiting Jiang:

Early detection of fake news based on multiple information features. 414-419 - Biao Ning, Bing Kong, Lihua Zhou, Chongming Bao, Chongyun Wang:

Algorithm for Mining Structural Holes in Weighted Networks. 420-426 - Xianbin Hong, Sheng-Uei Guan, Prudence W. H. Wong, Nian Xue

, Ka Lok Man, Dawei Liu:
Can AI Teach Humans? Humans AI Collaboration for Lifelong Machine Learning. 427-432 - Zhongming Yang, Xiaohui Lu, Lilong Huang, Jun Yu, Jianhui Yang:

Minimization of Dynamic Programming Algorithm by Three-dimension Model Collison Test Fitting. 433-437 - Manop Phankokkruad

:
Ensemble Transfer Learning for Lung Cancer Detection. 438-442 - Jiajun Hu, Weijie Shang, Jian Rong:

The Shortest Path Application of the Logistics System in Production Workshop. 443-447 - Yongliang Huang, Shulin Yang, Xiang Li, Jiao Peng, Meiqi Zhou:

Research on Publisher Topic Selection Based on Data Mining. 448-452 - Nikolaos Fournogerakis, Spyridon Poulos, Athanasios Petsakos, Dimitrios Vogiatzis

:
Intelligent Document Analysis in the Insurance Market. 453-457 - Ginel Dorleon

, Nathalie Bricon-Souf, Imen Megdiche, Olivier Teste
:
Absolute Redundancy Analysis Based on Features Selection. 458-461 - Qiang Liu, Song Yan, Jie Wan, Ruiqiang Ma, Jianhang Xu:

Multi-malicious nodes double-spending attack blacklist management model. 462-467 - Francis Fuller Bbosa

, Ronald Wesonga, Peter Nabende
, Josephine Nabukenya:
A Modified Decision Tree and its Application to Assess Variable Importance. 468-475 - Ruchun Cen:

Random Response and Extreme Value Response Analysis of Vortex Rod and Blade for Wire Feeder. 476-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














