default search action
AIIPCC 2022: Kunming, China
- International Conference on Artificial Intelligence, Information Processing and Cloud Computing, AIIPCC 2022, Kunming, China, August 19-21, 2022. IEEE 2022, ISBN 978-1-6654-6287-7
- Yihang Ma, Jirong Wang:
Simulation analysis of human-machine model dynamics based onADAMS. 1-5 - Guangyao Sun, Liang Zhang, Xiangdong Meng:
Beamforming of Frustum of a cone Conformal Array Based on Convex Optimization Theory. 6-10 - Wu Lan, Changjian Liu, Xiaoming Liao, Shan Cao, Bin You, Yi Hu:
Research on Signal Integrity Technology of Missile borne Integrated Control Unit. 11-15 - Zheming Zhang, Yunjian Li, Aoran Shen, Jiajun Hu:
An Intelligent Network Intrusion Detector Using Deep Learning Model. 16-19 - Yiteng Zhang, Meng Wang, Bolin Zhou, Xin Hu, Dongze Zhang:
Design and Implementation of DSpace Using OpenSCENARIO to Construct Scenarios in Vehicle Simulation Testing. 20-23 - Wenjing Hu:
An Improved Simulation Model of Duffing Oscillator with Lyapunov Characteristic Exponents. 24-27 - Kai Liu, Dazhu Yan, Yaojing Yang, Xin Lu, Min Zhao:
A Novel End-to-End Object Detection Model Based on Multi-scale Deformable Attention Module. 28-31 - Qing Hua, Zhenyuan Xu, Lina Huang, Huanyu Wang, Lu Zhang, Yuxiang Feng:
IPM Modeling Approach for Dynamic Simulation. 32-36 - Yuhang Ding, Wenrong Jiang:
Intrusion Detection Method Based On Improved Conditional Generative Adversarial Network. 37-40 - Qing Hua Guo:
Research on soft start of DFB laser temperature control system. 41-45 - Xiaojuan Chen, Xuejiao Pan, Guohua Li:
A residual combined attention mechanism based on U-Net network for kidney tumor image segmentation. 46-49 - Junya Huang, Zhihua Liu, Zhongmin Zheng, Xuan Wei, Man Li, Man Jia:
Research and Development of Intelligent Protection Capabilities Against Internet Routing Hijacking and Leakage. 50-54 - Naichao Chang, Qiaoxia Zhang, Zongjun Mu, Jianglin Li, Zhe Chen, Xin Xu:
AKPAVF: an Automatic Kernel Patch Applying and Verification Framework based on Virtualization. 55-62 - Dongyi Fan, Pengling Zhang, Suqiong Zhang:
ECIP: An Edge Cloud Intelligent Platform for Radio Access Network. 63-66 - Tong Wang:
Fault Simulation of A320 Aircraft Generator Based on Directed Graph. 67-73 - Yuyan Guo, Wenjun Ma:
Improvement of Energy Detection with Cooperative Sensing. 74-78 - Guanghui Zhang, Wenzhen Lu, An Dong, Zhijing Xu:
Automatic control system of wind power generation in mountain area based on Internet of Things technology. 79-82 - Shenglong Zou:
Research on Cascade Power Dispatching Based on artificial intelligence learning model. 83-86 - Feng Liu, Peiwei Wang:
Research on Personnel Precise Positioning System Based on UWB Technology. 87-90 - Jiyuan Zhang, Ying Zhou, Xiaofang Zhao, Jinyong Chen, Yun Wang:
Research on Cost Risk Assessment Method of Power Grid Engineering Based on LEC Method and Fuzzy Theory. 91-94 - Han Liu, Zhenghao Li, Xiuqiang Li, Xia Xu:
Design and Application of Intelligent Internet of Things Architecture Based on Digital Twin. 95-98 - Chunmei Hu, Yunhui Zhang, Guofang Xia, Xi Liu, Xinjian Ma:
Automatic Classification of Ancient Building Components Based on PointNet++. 99-103 - Bin Wang, Xiang Meng Fang, Zhu Zeng:
Risk Assessment and Early Warning Model of University Network Public Opinion Based on Dynamic Comprehensive Evaluation Method. 104-107 - Hui Feng, Xinghui Yin, Zhe Chen, Hui Feng:
Underwater salient object detection based on frequency-tuned. 108-111 - Feng Liu:
Multi-node Monitoring of Jujube Diseases and Pests Based on Internet of Things Technology. 112-115 - Yujia Shang:
Robust control of temperature parameters for high-precision calibration. 116-119 - Ge Chen, Chaofeng Huang, Tianyi Wang, Jiahui Wang:
College classroom attendance and teaching evaluation method based on face recognition. 120-124 - Ying Zheng, Xueying Zu, Yawen Deng, Dao Zhang, Zhinan Zhou, Yuran Liu:
Research on Capturing Random Burst Signals of Power Satellite Internet of Things. 125-132 - Shibei Xu:
Research on infrared detection and intelligent identification technology of oil and gas pipeline leakage. 133-136 - Liqing Shao, Haipeng Cao, Jing Yang:
Necessity of Regional Coordinated Development of New Energy Vehicles Based On System Dynamics Model. 137-140 - Jinzhang Jin, Yong Shi:
Micro-grid Power Conversion Control Method Based on Single-phase Isolated Energy Storage Converter. 141-144 - Xianju Wang, Ronald S. Cordova:
Heterogenous Center Alignment of Dual-Path Features for Text-Image Person Re-identification. 145-148 - Hao Chen, Xian Li, Kai Ma, Changnian Chen:
Flight cockpit gesture recognition based on YOLOv7. 149-154 - Mengyang Li, Shi Huang, Yingti Liu, Zihao Chen:
Game Storyboard Script: A Fast Camera Placement Tool for Cinematographic Information Processing. 155-160 - Min Zhao, Yaojing Yang, Kai Liu, Dazhu Yan, Zhonghua Liu:
A Object Detection Model with Multiple Data Enhancements. 161-164 - Youliang Gao, Chaosheng Huang, Xinyang Zhang, Xingyu Xiang, Weiwei Zheng:
Application of Internet of things in data aggregation system of electric power construction equipment. 165-168 - Zhao Hu, Sanbo Pan:
Research on Modulation Strategy of T-type Three-level Inverter. 169-173 - Long Wang, Cuilian Zhao:
Design of EMG and FMG multi-sensing acquisition system for lip muscle training. 174-177 - Xin Guo, Qinghua Yao, Xiaofeng Zhang, Xinrui Liang:
Error Correction of Modulation Transfer Function in High Resolution Imaging System by Improved Slanted- Edge Method. 178-183 - Xinyu Zhou, Guifen Chen, Ying Hu, Xinzhou Li:
D2D interference management and resource allocation scheme based on improved graph coloring. 184-187 - Dazhuang Liu, Zhen Yang, Ru Zhang, Jianyi Liu:
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping. 188-191 - Shuoyang Gao, Changxin Nai, Jingcai Liu, Hongjian Bian:
The development of the portable leakage detector data acquisition device. 192-197 - Guo-Jun Lai, Yi Liang, Xiao-Wei Wang:
Task and State Oriented Optimization of Helicopter Air-to-Ground Communication Network Reconfiguration. 198-202 - Qizheng Huo, Shaonan Li, Yongqiang Xie, Zhongbo Li:
Horizontal Pod Autoscaling based on Kubernetes with Fast Response and Slow Shrinkage. 203-206 - Dan Wang, Xue Yang, Li Xu:
Design of Launch Vehicle Test Information Management System based on IETM. 207-210 - Zhongfeng Pan, Wencheng Che, Xiaolong Liang, Yibo Zhang, Xiang Du:
Fault segment location method based on CEEDMAN-Energy Relative entropy. 211-214 - Xi Song, Wenpeng Gao, Xuyang Wang, Yaling Yun, Xiao Zhang, Ran Li:
TDOA/FDOA Joint Positioning Method for Wireless Charging Vehicle. 215-220 - Fuzhan Yue, Zhiying Cui, Shenyang Li, Hui Jing, Shuangna Zhang, Meng Wang:
A Satellite Augmentation System based on LEO mega-constellation. 221-225 - Lin Chen, Xiao Zeng, Di Li:
A two-stream attention mechanisms network. 226-230 - Yanhong Jian, Haifeng Zhang, Honggang Wang, Hanmei Ma:
Research on Power Grid Condition Monitoring Method Based on Big Data. 231-234 - Yang Zhong, Wanhe Du, Shuzhen Yang, Xueping Zheng, Tao Yu:
Feature extraction and multi-period classification of sea mushroom based on image information. 235-238 - Lu Wang, Chenye Zhang, Tian Xie, He Li:
Research on Data driven Communication Network Situation Awareness System. 239-242 - Kaiyun Dong, Zhao Yi, Tao Jia, Shiqiang Wu:
2.4GHz wide band high efficiency rectenna with three sector branches. 243-248 - Bo Hu, Bolin Qi, Qiang Cui, Daosheng Sun, Jifang Shen, Lianjun Gao:
Design and Research of Power Engineering Material Online Management Platform Based on the Internet of Things. 249-252 - Chenxi Xia, Wanlu Dai, Dong Li, Fengling Li, Kai Liu, Zhijie He:
Multi-influenced Factors Prediction Using a Combination of GEP and PCA-GRNN Model Based on the Shapley Value Method. 253-259 - Fulin Li, Chen Meng, Cheng Wang, Shuyi Fan:
Data mining for risk prediction of diabetes mellitus. 260-263 - Chaoyue Xu, Penghao He, Ying Yu:
Pyramid Structure-Based Context Aggregation Detail Restoration Low-illumination Image Enhancement Network. 264-269 - Sheng Peng, Linkai Zhu, Jiadong Lu, Renhui Tian, Shiyang Song, Wennan Wang:
An Optimizing E-govenment Model for Data Sharing via Distributed Ledgers. 270-274 - Feng Liu:
University Intelligent Teaching Information Processing Management Platform Based on Resource Clustering Method. 275-278 - Cuifang Zheng, Jiaju Wu, Zheng Cheng, Linggang Kong, Shijia Kang, Bin Luo:
Research on IETM Data Publishing. 279-284 - Lixiang Shen, Lijin Wu, Jingdong Guo, Wenliang Liu, Wen Ji, Qian Chen:
A vulnerability scanning and verification system for power information systems. 285-289 - Hongliang Tang, Da Lyu:
Analysing Management Data through Cascade Additive Noise Models from Shanghai Scenario. 290-293 - Qunyi Chu, Shihua Liang, Mingrui Yang:
Visibility Analysis in Fog Weather Based on Convolution Neural Network and Transfer Learning. 294-298 - LaLao Gao, DingJun Zhang, MingChao Liao, ZhiQiang Huang:
Multivariate time series prediction based on graph convolutional neural networks. 299-303 - Haotian Liu, Jie Zhang, Wei Liu:
Optimisation and research of Los Angeles communication network hotspots based on machine learning and social software data. 304-309 - Zhengxiong Mao, Hang Zhang, Hui Li, Zuyuan Huang, Yuan Tian, Xiaoping Zhao:
A Federated Deep Reinforcement Learning-based Approach to Secure Resource Allocation in Power Communication Networks. 310-315 - Zhonglin Li, Zijing Cheng, Yan Wang:
Parameter Tuning of Active Disturbance Rejection Control Based on Improved Snake Optimization Algorithm. 316-322 - Shaoguo Cui, Yunan Zhang, Hao Wen, Yibo Tang, Haixiang Wang:
ASPP-UNet: A New Semantic Segmentation Algorithm for Thyroid Nodule Ultrasonic Image. 323-328 - Huiying Liu, Zhimin Chen, Wei Pu, Lulu Fang:
A Data Analysis Method of Military Training Performance Based on Apriori Algorithm. 329-332 - Chen Chen, Gang Chen:
Computer network system security assessment method. 333-336 - Shan Jiang, Jian Qi, He Lei, Li Zhu, Li Zhou:
Equipment selection method and application of power grid infrastructure project based on particle swarm algorithm. 337-341 - Chengqiong Ye, Mali Sun, Yang Chen:
Research on Key Technologies of Network Intrusion Detection Based on Machine Learning. 342-349 - Mengxuan Li, Jingshan Han, Lei Gao, Zhi Yang, Yangzhe Chen, Liu Huang:
Research on Fatigue Assessment Algorithm based on ECG and Multi-source Physiological Signals. 350-355 - Jihui Fan, Fengshan Yuan:
Recognition of Junk Short Messages Based on Local Sensitive Hash KNN Algorithm. 356-359 - Shan Jiang:
Prediction of regional ecological security by applying deep learning methods in spatial and temporal simulation. 360-363 - Zipeng Chen:
Research on the Application of LSTM Model Based on Electrical Equipment in Electromagnetic Field Calculation. 364-367 - Mixue Zhu, Zhiqiang Liu, Xu Zhang, Wenjing Li, Jiaxin Su:
YOLOv5 Improved Smoke Detection Algorithm *. 368-373 - Baoqiang Zhong, Yikai Tan, Wei Wang, Weihong Cui, Zehan Cai, Lai Wei, Qian He:
Research on the identification of network traffic anomalies in the access layer of power IoT based on extreme learning machine. 374-378 - Yuehua Song, Xin Li, Chen He, Xuying Fan, Yuyao Feng, Jize Wei, Kai Yu, Zichun Zhao:
Research on computer vision-based inspection of tiny parts. 379-383 - Ming Zhang, Qingxing Li:
Research on insulator detection algorithm of YOLOv5 fused with attention mechanism. 384-388 - Shangping Kong, Luoning Gan, Ruofan Wang, Guozhe Zhou:
Target Tracking Algorithm of Radar and Infrared Sensor Based on Multi-Source Information Fusion. 389-392 - Xuesong Su, Huifang Song, Yifei Wang, Mei Wang:
A short text topic classification method based on feature expansion and bi-directional neural network. 393-397 - Huilong Zhu, Jing Zhang, Li Hu, Chenghao Li, Maomao Shan, Qiyu Duan:
Data Augmentation Algorithm Based on Local Dynamic Transformation. 398-404 - Huazhang Liu, Jun Zhang, Zhongli He, Shunjie Lin:
Research and Implementation of UWB Data Transmission Algorithm for UAV Formation Flight Control. 405-408 - Yaofu Cao, Tianquan Li, Xiaomeng Li, Jincheng Zhao, Junwen Liu, Junlu Yan:
Research on network security behavior audit method of power industrial control system operation support cloud platform based on FP-Growth association rule algorithm. 409-412 - Xiyue Wang:
Research on Intelligent Garbage Classification Algorithm Based on Deep Learning. 413-416 - Dongsheng Xiang, Baisong Zhu, Xu Wu, Yangfei Ou:
Safety helmet detection algorithm in complex scenarios based on YOLOX. 417-421 - Xiangyu Mao, Zhida Zhang, Kewei Zhang, Xiqiang Jia, Huiqin Shao:
Anomaly Detection based on Teacher-Student Network in the field of Security Document Production. 422-425 - Yueming Chen, Xinhui Xu, Caiying Huang, Wenhua Yao:
Selection of Prediction Factors of Gross Primary Productivity Based on Artificial Neural Network. 426-429 - Huijun Ni, Yingjue Ma:
Research on "scenario assessment+" action mode applied in agile talent training with k-prototype algorithm. 430-433 - Yikai Sun, Dong Yuan, Ming Gao, Penghui Zhu:
GPU Acceleration of Monte Carlo Tree Search Algorithm for Amazon chess and Its Evaluation Function. 434-440 - Miantao Ma, Zeting Chen, Zhou Fang, Haoyu Xu:
Classification algorithm of streaming media big data fusion under multi-task information filtering. 441-446 - Yali Zhang:
A multi-system collaborative data security and cross-domain authorization mechanism based on domestic cryptographic algorithms. 447-450 - Yazhong Chen, Heng Shan, Haoran Wei:
Research on communication signal interference suppression based on deep learning. 451-454 - Zhaoke Li, Shuwei Xu:
A Study of User-item Graph Neural Network Recommendation Based on GCCGAT-LSTM. 455-457 - Hongtao Li:
Network Security Situation Awareness Based on Particle Swarm Optimization of Gated Cycle Unit. 458-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.