default search action
4th ICCEIC 2023: Guangzhou, China
- 4th International Conference on Computer Engineering and Intelligent Control, ICCEIC 2023, Guangzhou, China, October 20-22, 2023. IEEE 2023, ISBN 979-8-3503-0887-7
- Lei Li, Wei Pan, Dejian Li, Guojin Liu, Tiancong Huang:
Task Scheduling Based on Heterogeneous Priority and Critical Task Duplication. 1-9 - Linhao He, Yunchao Wang, Chenyu Yan, Xixing Li, Qiang Wei:
KBEE: Linux Kernel Vulnerability Exploitability Exploration. 10-15 - Hao Yu, Jun Lu, Bo Zhao, Bao Feng, Yuxiang Bian, Xingyu Zhou:
Advantage Distillation Assisted Four-intensity Measurement-Device-Independent Quantum Key Distribution. 16-19 - Haiyang He, Jingsha He:
Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing. 20-23 - Haobo Qin, Le Yu, Feng Zhang:
Mutation Scheduling optimization Strategy based on Fuzzy Testing. 24-30 - Hang Xiang, Jiujiang Han, Ming Xian, Huimei Wang, Yi Sun, Peng Sun:
Research on the Application of Reinforcement Learning in Network Security. 31-34 - Jiangjie Xi, Jingjing Wang, Chenggang Gu, Wei Zhang:
Phase Noise Measurement Method and Uncertainty Analysis. 35-39 - Meng Li, Jufu Xue, Jiarui Cheng, Qiqi Yan:
Design of a Micro Corrosion Monitoring System Based on Dynamic Polarization. 40-43 - Zhihai Wu, Linbo Xie:
Fault-Tolerant Consensus of Single-Integrator Multi-Agent Systems in the Presence of Asynchronous Self-Sensing Function Failures. 44-48 - Qingbin Sun, Lixin Zhan, Yicheng Jiang, Jinyu Xu:
Low Power Intelligent Haptic System Based on Elastic Wave Technology. 49-52 - Ruiqing Yue, Guangcan Yang, Peixuan Li, Jiaqi Xie, Feipeng Jiao, Ling Zhan:
A Security Verification System Based on Bilinear Maps in the Multi-cloud Environment. 53-57 - Junhua Zeng, Jiacheng Li, Pengyang Xu:
Research on network security situation awareness prediction model based on deep learning methods. 58-62 - Ning Tian, Gong Chen, Yu Zhou, Xueliang Bao:
A Type-2 Fuzzy PID-Based System of Surface FES with Pulse Width Modulation for Stroke Rehabilitation. 63-68 - Yacheng Qiu, Xinzui Wang, Fucheng Cao, Shichen Su:
Legendre pseudo-spectral method for solving the optimal starting pendulum of a rotating inverted pendulum. 69-73 - Zhengyang Zhang, Wei Dong, Xinya Sun, Yindong Ji:
A Situation Deduction Method for Rail Transit Network Based on Dynamic Bayesian Network with Gaussian Mixture Model. 74-83 - Xiaodong Li, Yuqiang Li, Yingmin Zhang:
A construction and optimization method of a highly available intelligent domain name system. 84-88 - Dongyuan Xu, Xiao Yue, Bin Hua:
Intrusion Detection Method Based on BiGRU and CBAM. 89-92 - Yang Cheng, Zhenyu Liu, Fanrui Luo, Mingmin Liu, Xiaoyu Li, Jianliang Zhu:
With Fused Point Cloud Height and Intensity Information improved the Loop Closure Detection for LeGO-LOAM. 93-98 - Dandan Fu, Zishuo Chen, Xuejiao Liao, Jing Feng, Xun Liu, Zhenfei Zhang:
Tomato leaf diseases classification with convolutional neural network. 99-102 - Yibo He, Zheng Li, Xiaoming Dong, Shu Zhang:
A Knowledge Embedding and Multi-Head Selection Model for Nested NER. 103-109 - Hui Ren, Chunxiao Han, Shanshan Li, Yanqiu Che, Ruofan Wang:
Suppression of Epileptiform Activity in a Wilson-Cowan Network Model by Distributed Linear Delayed Feedback Control. 110-113 - Zhi Li, Jiaxin Wang, Jiahao Wei, Houbin Wang:
Research of online learning status monitoring based on deep learning. 114-119 - Ziang Li:
Analysis and Applications of 2D Discrete Fourier Transform in Image Denoising and Edge Detection. 120-129 - Xiaoyong Yu, Liwen Qin, Xin Chen, Lifang Wu, Biyun Zhang:
Research on Optimization of Neural Network Model Deployment for Edge Devices. 130-134 - Bihao You, Jiahao Qin, Yize Liu, Yitao Xu, Sijia Pan:
Attention ResNet-GRU model for Typhoon Prediction. 135-140 - Hui Li:
Optimizing the Controllability of Complex Network Systems by Changing Coupling Coefficients. 141-144 - Junmei Liao, Shibin Song:
Research on Laboratory Security Situational Awareness System Based on Microservice Architecture. 145-148 - Xiaoyong Yu, Liwen Qin, Xin Chen, Lifang Wu, Biyun Zhang:
Construction of Multi-scale Target Detection Model for Security Signage Recognition. 149-153 - Bo Zhang, Zesheng Xi, Jieying Zhou, Chuan He, Bo Lu, Yunfan Wang:
Secure Access for Massive Devices in the Industrial Internet of Things (IIoT). 154-158 - Boyu Jin:
Research on Improving The Deep Learning Model of Differential Privacy Using Normalization Method. 159-162 - Jefferson Ng, Yijian Li, Xuxiao Ji, Can Yang, Jiaqiao Wan, Xingyu Lu:
Analyzing and Comparing Results for Multiple Machine Learning Models. 163-170 - Jinyuan Liu, Yi Ma, Qidong Zhao, Yong Yu, Qing Chang, Yue Fang:
Research on Compressed sensing and Transmission Methods of Video Resources Based on Virtual Reality. 171-175 - Kan Wu, Jianjiang Liu, Jun Ma, Xianhui Guo:
Goal-Directed Target Discovery in Social Network. 176-179 - Lulu Xue, Jiani Li, Kejia Zhang, Tianqiu Yu:
Decentralized Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Hidden Policy for Cloud Data Sharing. 180-185 - Guanglai Li, Sibao Wang, Bo Yang, Yifang Fang:
Couple-Group Consensus for Leader-Following Nonlinear Multi-Agent Systems under Network Attacks and Decay. 186-193 - Min Huang:
Design of Message and File Delivery System Based on C plus plus and QtToolkit. 194-197 - Qian Chen, Haichao Zhao, Chi Wan, Tianrun Yang:
Dangerous Art Paintings: Artistic Adversarial Attacks on Salient Object Detection. 198-204 - Zongling Yu, Chunxin Shi, Huachen Zhao, Rui Xue, Zhe Xu:
Application of double closed-loop multi-coupling serial control data decoupling techniques to aircraft cockpit loop control systems. 205-209 - Yuyan Chen, Chuanfu Zhang, Tao Zhang:
Spatial-Temporal Decisions for Moving Target Defense Game Subject to Quality of Service Constraints. 210-215 - Qing Liu, Heming Wang, Fangxu Lv, Geng Zhang, Dongbin Lv:
Low-Jitter Retimer Circuits for High-Performance Computer Optical Communications. 216-220 - Jie Xu, Yuanyuan He, Jiaying Li, Lijun Wang, Jing Xu, Huan He, Linbing Xie, Ke Miao:
Knowledge extraction and entity linking model based on attention mechanism. 221-225 - Yihua Guo, Li Kang, Renjun Jia, Ting Wang:
Multi-cycle Deep Recurrent Learning for Power Consumption Time Series Prediction. 226-230 - Yuanjie Li, Qing Fei:
Design of Multi-channel Voice Data Acquisition and Storage System. 231-235 - Xichang Cai, Juan Wu, Menglong Wu, Yanggang Gan:
Sound Event Classification Based on Fusion of Multiple Pre-trained Models. 236-239 - Wenzhi Wang, Na Wang:
A load balancing scheme of concurrent Internet of Things terminal equipment based on p-probability delay. 240-243 - Chenxuan Cong, Junjie Ma, Wen Gao, Kai Lin:
Communication power supply design based on PFC and LLC. 244-247 - Xingzhe Liao, Zhibin He:
Unbalance fault diagnosis of Marine gas turbine based on RDE-SVM algorithm. 248-255 - Yixin Yu, Yiwei Liang, Yu Wanga, Zenghui Ding, Lixiang Yu, Xingshuo Li:
A text detection algorithm for natural scenes based on improved GAU and CBAM. 256-262 - Xin Wang, Xu Zhao, Yubing Zhang, Yubo Wang, Jiang Shao, Xinggen Qu:
Research on OTDOA Positioning Method for 5G in Multipath Channel. 263-269 - Mingming Zhao:
Application of an Improved Ant Colony Algorithm in Vehicle Routing Problem. 270-273 - Yaning Zhang, Xing Tian, Yanan Li, Wenhui Yuan:
Ant Colony Algorithm Based Unmanned Surface Vehicles Task Allocation Design and Implementation. 274-277 - Jingzhi Gao, Xuesong Su:
Style-Infused Image Restoration with GAN. 278-282 - Danyang Guo, Yinghao Zheng, Jiaxin Lu, Sihua Liang, Tuyin Chen, Jialin Yang, Chao Zhou:
Research on Enhanced Hybrid Whale Optimization Algorithm with Inverse Learning Strategy and Lévy Flight Mechanism. 283-289 - Bin Zhang, Xuhua Shi:
Dynamic Constrained Time-Domain Robust Optimization with Noises. 290-295 - Jianhua Xie, Fagen Gong, Liu Hai, Wenquan Zeng:
Construction of Parking Space Recommendation Model Based on Big Data and Multi attribute Decision Algorithm. 296-301 - Li Tan, Xujie Jiang, Zikang Liu, Hongtao Zhang, Ziliang Shang, Yuzhao Liu:
Crowd counting in dense UAV images based on multiscale feature fusion. 302-306 - Zijun Liang, Meiying Cui, Rouying Wu, Xianze Ye, Guanpeng Su:
Harnessing the Power of GPT-3 and LSTM for Natural Language Processing in Agricultural Product News: Focus on Soybeans. 307-311 - Xiaohui Li, Zhe Yu, Lin Han, Qiushi Yao:
Research on Real-Time Video Stream Authentication Based on SM2 in H.264. 312-316 - Jinhao Wu, Xinyi Li, Yukun Fan, Weiguo Liu:
On the application of self -adaptation and mutation domain fuzzy algorithm in the optimization of the dynamic characteristics of micro -aircraft. 317-323 - Zhizhen He, Wenjun Wei:
Finite-Time Resilient Output Regulation of High-Order Multi-Agent Systems with External Disturbances and Uncertain Nonlinearities. 324-328 - Junnan Li, Siyuan Hong, Xiying Chen, Chuan Ai, Liang Fan, Yanping Ke, Linna Wang:
An improved target detection algorithm applied to domestic edge computing module. 329-333 - Qinsheng Yun, Xiangjun Wang, Shenghan Wang, Sheng Cao:
Speed optimization for fuel saving of a marine diesel engine generator in DC power station base on GWPSO algorithm. 334-344 - Hua Qin, Pengfei Wang, Linping Xu:
Research on Equipment Fault Analysis based on Machine Learning Algorithm. 345-350 - Qiaoqiao Feng, Jialong Sun, Kejia Zhang, Sainan Wang:
Energy Efficient Federated Learning Joint Communication and Computation Framework Over Wireless Networks. 351-355 - Dun Liu, Wen Shi, Linfeng Jiang, Jiazhi Sun, Changyi Xin:
A Comparative Study of Machine Learning and Deep Learning Models for Weather Image Classification. 356-365 - Yansheng Gao, Zhiyuan Cheng, Hua Su, Zhou Ji, Jiahao Hu, Ziqian Peng:
Infrared and Visible Image Fusion Method based on Residual Network. 366-370 - Guangxian Xu, Yunhan Mao, Fei Ma:
Second-order multi-agent consistency based on edge event triggering. 371-375 - Lixiang Lin, Chenxi Zhang, Zhifang Zhu, Yi Liang, Guoyue Wu:
Prediction of Distribution Network Load Release Stage Coefficients Using Crisscross Optimization Algorithm-Improved Back-Propagation Neural Network Method. 376-380 - Guangyi Wang, Jiangnan Yuan, Jun Tang, Yanjun Hong:
A Range Estimation Algorithm for Correction of Spectral Line in FMCW Radar and Implementation. 381-385 - Yi Zhang, Yuanyuan Tang, He Li, Yuchi Jiang, Wenwei Liang:
Research on local instrument data collection method in ship engine room based on machine vision. 386-393 - Chao Li, Shiyuan Fu, Yiwen Jiao, Hongbin Ma, Wei Zhang, Chao Yun:
Improved Load Balancing Algorithm for a Novel Distributed Computing Framework Based on MultiObjective Optimization Algorithm. 394-399 - Jingsong Cao, Tianxin Feng, Qiaoxin Zhang:
Modeling Optimization of Prefabricated Parallel Production Manufacturing System Based on Hybrid Algorithm of Variable Neighborhood Taboo Search. 400-404 - Lin Li, Xun Li:
Intelligent monitoring module designed for industrial IoT scenarios. 405-408 - Xiang Han, Yongfeng Qi, Liqiang Zhuang, Liang Hu, Shengcong Wen:
Multi-attention Based Face Forgery Detection. 409-412 - Xiantao Liu, Jie Zhang, Hao Feng, Wei Huang:
Millimeter-Wave Network Handover Control based on Multi-Agent System. 413-418 - Ying Su, Ziling Zhang, Qingfeng Han, Kai Sun:
Cooperative Handover Performance Analysis in a Cell-Free Architecture. 419-423 - Luming Zhang, Xuesong Su, Wenguang Zheng:
MSFNet: Multi-Stage Fusion Network for Myocardial Infarction Classification. 424-427 - Teng Lv, Ping Yan:
A Lightweight JSON Storage Method Based on Adjacency Linked Lists. 428-432 - Zhiyang Zhang, Fengli Zhang:
VECCTO: An Collaborative Task Offloading Framework for UAV-Assisted Vehicular Edge Clusters. 433-437 - Shuang Tian, Yanwei Du, Lu Wang:
An Improved Artificial Potential Field Method for Aircraft Path Planning Based on Deep Reinforcement Learning. 438-443 - Yilin Chen, Zhan Shi:
A printed formula recognition method based on the "Encoder-Decoder" deep learning model. 444-448 - Changliang Song:
Target Vessel Motion Model in an Intelligent Collision Avoidance Simulation System. 449-453 - Guang Yin, Yong Tang, Wei Xie, Zhenhao Luo, Yaohua Wang:
Applying Binary Code Similarity Detection on Acceleration Processor. 454-459 - Guowei Liang, Zhongjian Kang:
PID Control on Deformable Fuzzy Neural Network. 460-465 - Chao Yi, Xiaoying Cui, Yan Lei, Tao Qiu:
Research on Control Quality Evaluation System of Static Shift for a Hydraulic Mechanical Transmission. 466-471 - Junjie Liu, Yanhui Wu:
Flow Perturbations Control of Compressor under Inlet Flow Distortion using Unsteady Jet Injection. 472-481 - Yiming Zhou, Xiangshun Li:
Parameter Optimization of MFAC Based on Grey Wolf Optimizer. 482-486 - Haiyun Sun, Pengfei Yin:
Application of GAP Technique in Ship Observation System. 487-491 - Jipu Geng, Xiaoyan Zheng, Xiaohan Lai, Lei Zhao, Yibai Xu:
Construction and Implementation of Electric Power Deep Learning Computing Service Platform. 492-495 - Qi-Liang Liu, Fu-Ning Si:
Dead-zone Compensation for Manipulator Based on Backstepping Adaptive Sliding Mode Control. 496-500 - Jun Xia, Jun Li, Xinfan Jiang, Bo Zhou, Zesheng Xi:
Design of an Automated Security Protection System for Power System. 501-506 - Haixia Ding, Bowen Xu, Xianyu Wu:
Research progress and prospects on intelligent control methods for hypersonic flight vehicles. 507-514 - Chi Zhang, Zhansheng Wei:
Research on the Design of an Intelligent Automated Automotive Steering Gear Test Bench. 515-519 - Ruihang He, Yongze Xu:
Overfitting Identification in Machine Learning Models with the Person-Fit Indicator. 520-524 - Mingying Ma, Muqing Deng, Dandan Liang, Xiaoyu Huang:
Computer-aided method for paroxysmal atrial fibrillation detection based on ECG signals. 525-529 - Yuxin Cao, Yue Zhao, Lijun Li, Chenye Zhang, Zengshou Dong:
Rolling bearing cross-domain fault diagnosis based on transfer learning domain generalization. 530-533 - Tong Jiang, Yanhua Xian:
Detection of Traffic Signs in Complex Weather Conditions Based on YOLOv5. 534-538 - Tiancheng Luo:
Study on Adaptive Cruise Control Systems of Passenger Vehicles and Solutions Based on V2X Technologies. 539-549 - Kun Liang, Houyu Zhao, Feng Wang, Yiyun Fang:
Design and application of pressure monitoring system of compressed air station based on LoRa wireless networking technology. 550-554 - Xiaoyong Yu, Liwen Qin, Xin Chen, Lifang Wu, Biyun Zhang:
Design and Development of An Onboard Intelligent Device based on Jetson NX. 555-559 - Jun Hong:
Automatic deflection detection of bridge and gantry cranes based on PLC control technology. 560-563 - Tai Liu, Ruizheng Jiang, Yuliang Cui, Xiuyu Chen, Hangjie Wu:
Modeling and simulation of marine oil separator based on Matlab. 564-569 - Yuxiang Zeng:
Fault diagnosis method of rolling bearing based on Xception-CNN model. 570-573 - Zhiwei Wu, Qin Wei:
RunFE: Architecture of Running Intensity Classification Based on 3D Facial Expression Encoder. 574-578 - Yuchi Jiang, Yuanyuan Tang, Wenwei Liang, Yi Zhang, He Li:
Research on Monitoring Authority Management of Intelligent Ship Electromechanical System Based on Soundprints. 579-585 - Xin Yang:
Twin Modeling and Generative Adversarial Network Bearing Fault Diagnosis Enhancement Methods. 586-590 - Yang Yu, Rui Zhang, Ziyan Tang, Han Wang, Xiaona Zhuang, Ruofan Zhao, Yusen Ma, Peilin Gao, Zhanzhi Gong, Haibo Chen:
A walking assistance robot based on bionic traction characteristics. 591-594 - Zhipeng Su, Zhiwen Yu, Li Ma, Jianlin Tang, Bin Qian, Xiaoming Lin, Fan Zhang:
Short-term load prediction of electric vehicle charging station based on Long-Short-Term Memory Neural Network. 595-599 - Ying Zhao, Jun Dong, Xingyuan Fan, Xiaoming Lin, Jianlin Tang, Bin Qian, Fan Zhang:
Electric Vehicle Charging Load Prediction Method Based on Nonlinear Auto-Regressive Neural Networks. 600-605 - Chenglong Zhao, Guofu Wang, Tao Mo, Donghui Meng:
Torque optimization control strategy for pure electric motorcycles. 606-609 - Yu Wang, Zhoujun Li, Yipeng Zhang, You Zhai:
IoTAEG: Automatic Exploit Generation of IoT Devices. 610-619 - Jinlong Yang, Li Feng, Yuanming Lu:
Rolling bearing fault diagnosis method based on enhanced knowledge distillation and lightweight convolution network. 620-627
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.