default search action
18th GPC 2023: Harbin, China - Part I
- Hai Jin, Zhiwen Yu, Chen Yu, Xiaokang Zhou, Zeguang Lu, Xianhua Song:
Green, Pervasive, and Cloud Computing - 18th International Conference, GPC 2023, Harbin, China, September 22-24, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14503, Springer 2024, ISBN 978-981-99-9892-0
Industrial Digitization and Applications
- Yingnan Zhao, Xuezhao Qi, Jian Li, Dan Lu:
UEBCS: Software Development Technology Based on Component Selection. 3-13 - Xinjian Zhao, Qianmu Li, Qi Wang, Shi Chen, Tengfei Li, Nianzhe Li:
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing. 14-29 - Qiulan Wu, Xuefei Chen, Suya Shang, Feng Zhang, Wenhui Tan:
A Method for Small Object Contamination Detection of Lentinula Edodes Logs Integrating SPD-Conv and Structural Reparameterization. 30-46 - Jun Wang, Kiminori Sato, Bo Wu:
A Study of Sketch Drawing Process Comparation with Different Painting Experience via Eye Movements Analysis. 47-60 - Dan Lu, Guoyu Han, Yingnan Zhao, Qilong Han:
Review of Deep Learning-Based Entity Alignment Methods. 61-71 - Jianwei Wang, Ke Yan, Xiang Ma:
VMD-AC-LSTM: An Accurate Prediction Method for Solar Irradiance. 72-87 - Dan Lu, Siao Li, Yingnan Zhao, Qilong Han:
Anomaly Detection of Industrial Data Based on Multivariate Multi Scale Analysis. 88-100 - Yingnan Zhao, Yang Sun, Bin Fan, Dan Lu:
Research on Script-Based Software Component Development. 101-112 - Lujia Yang, Wenye Shu, Yongjia Wang, Zhichao Lian:
Integration Model of Deep Forgery Video Detection Based on rPPG and Spatiotemporal Signal. 113-127 - Wenmin Lin:
A Design of Hybrid Transactional and Analytical Processing Database for Energy Efficient Big Data Queries. 128-138 - Fang Dong, Shaowu Yang, Cheng Zeng, Yongjun Zhang, Dianxi Shi:
Chinese Medical Named Entity Recognition Based on Pre-training Model. 139-155 - Qiuhong Sun, Jiaqi Wang, Xiaokang Zhou:
A Function Fitting System Based on Genetic Algorithm. 156-168 - Wenqian Shang, Kang Song, Yong Zhang, Tong Yi, Xuan Wang:
A Rumor Detection Model Fused with User Feature Information. 169-176 - Maoguang Wang, Jiaqi Yan, Yuxiao Chen:
Design and Implementation of a Green Credit Risk Control Model Based on SecureBoost and Improved-TCA Algorithm. 177-191 - Shu Zhan, Yang Li, Chunyan Liu, Yunlong Zhao:
Unsupervised Concept Drift Detection Based on Stacked Autoencoder and Page-Hinckley Test. 192-208 - Peixin Huang, Chen Dong, Zhenyi Chen, Zihang Zhen, Lei Jiang:
An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm. 209-222 - Jiahui Fei, Yunpeng Sun, Yuejin Wang, Zhichao Lian:
Intrusion Detection System Based on Adversarial Domain Adaptation Algorithm. 223-237 - Guangshuo Li, Lingling Cui, Yue Song, Xiaoxia Chen, Lingxiao Zheng:
Small-Sample Coal-Rock Recognition Model Based on MFSC and Siamese Neural Network. 238-247 - Xingzhi Chen, Ruiqiang Ma, Shanjun Zhang, Xiaokang Zhou:
Elemental Attention Mechanism-Guided Progressive Rain Removal Algorithm. 248-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.