Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Feature Analysis for Incomplete Time Series Classification
FAIML '24: Proceedings of the 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine LearningPages 266–274https://doi.org/10.1145/3653644.3653661This study introduces an innovative imputation-free framework for time series classification amidst missing values, challenging traditional imputation-based approaches. By integrating GRU-based imputation with a noisy-robust feature learning module, our ...
- ArticleJuly 2024
Students’ Perceptions on the Designed Instructional Videos in Their English Writing: A Narrative Study
Proceedings of the International Conference on Advancing and Redesigning Education 2023Pages 767–772https://doi.org/10.1007/978-981-97-4507-4_84AbstractThis paper introduces a theoretical framework aimed at enhancing the design of digital instructional videos, with a focus on helping students achieve a higher level of automated learning. By creating well-structured instructional videos, schools ...
- short-paperMarch 2024
FODGE - Fast Online Dynamic Graph Embedding
ASONAM '23: Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 258–262https://doi.org/10.1145/3625007.3627481Graph embedding algorithms (GEA) project each vertex in a graph to a real-valued vector. Dynamic GEA (DGEA) are used to project dynamic graphs, where vertices and edges can appear and disappear. Such graphs are mostly divided into snapshots. Current ...
- research-articleJanuary 2024
High Voltage Equipment Monitoring and Early Warning Based on Data Analysis
PCCNT '23: Proceedings of the 2023 International Conference on Power, Communication, Computing and Networking TechnologiesArticle No.: 55, Pages 1–5https://doi.org/10.1145/3630138.3630473The stable, safe and economic operation of large thermal power units is closely related to the efficiency of the power plant and the stability of the power grid. The equipment failure of the power plant will have a serious impact on the safe and economic ...
- ArticleJuly 2023
The Application and Expression of Product Modeling Design from Cross-Cultural Perspective
AbstractWith the development of society and the change of the times, the trend of economic globalization has further strengthened and accelerated the arrival of cultural globalization. The modernization of society, the internationalization of design, and ...
-
- research-articleJanuary 2023
Research on evaluation of network payment security
International Journal of Information Technology and Management (IJITM), Volume 22, Issue 1-2Pages 110–126https://doi.org/10.1504/ijitm.2023.130062This paper collects data about network payment fraud through a questionnaire and then analyses the data. We propose a prediction model based on the hybrid support degree apriori algorithm. First, is to find out the factors that are closely related to the ...
- research-articleApril 2022
Research on Market Power Control Method of New Energy Supply Spot Market
ICITEE '21: Proceedings of the 4th International Conference on Information Technologies and Electrical EngineeringArticle No.: 29, Pages 1–4https://doi.org/10.1145/3513142.3513172Influenced by the characteristics of new energy resources, generation characteristics and policy factors, the market force causes and action mechanism of spot market of new energy power supply are more complicated, and the applicability of existing ...
- research-articleAugust 2021
Machine Learning for Credit Card Fraud Detection
ICCIR '21: Proceedings of the 2021 1st International Conference on Control and Intelligent RoboticsPages 213–219https://doi.org/10.1145/3473714.3473749With the development of E-bank, the use of credit cards gets an unprecedented improvement as well as the problem of credit card fraud. To overcome this problem, we need automatic systems to finish the fraud detection. The number of monitored account ...
- research-articleAugust 2021
Design of Coal Mine Safety Monitoring System Based on Multi-Agent
ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information SystemsArticle No.: 277, Pages 1–7https://doi.org/10.1145/3469213.3470710Aiming at the complex production environment and harsh conditions of existing coal mines, and the shortcomings of many underground workers, small construction space, labor-intensive, etc., this paper applies multi-agent technology to the coal mine ...
On the Naming of Methods: A Survey of Professional Developers
ICSE '21: Proceedings of the 43rd International Conference on Software EngineeringPages 587–599https://doi.org/10.1109/ICSE43902.2021.00061This paper describes the results of a large (+1100 responses) survey of professional software developers concerning standards for naming source code methods. The various standards for source code method names are derived from and supported in the ...
- short-paperOctober 2020
Design of Interactive Virtual Assembly Simulation System for CNC Machine Tool
AIAM2020: Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced ManufacturePages 387–391https://doi.org/10.1145/3421766.3421889Virtual assembly simulation system plays a vital role in the intelligent manufacturing, especially in the field of complex machine or product manufacturing. The designing defects or product drawbacks could be identified in the designing period using the ...
- research-articleMay 2020
Personal Attributes Identification based on Gait Recognition using Smart Phone Sensors
ICCAE 2020: Proceedings of the 2020 12th International Conference on Computer and Automation EngineeringPages 94–97https://doi.org/10.1145/3384613.3384642Every individual has a unique gait that can not only be used for identification but also when observed carefully, may reveal personal attributes like age, gender, weight etc. of a person. This information can then be used for a number of purposes like ...
- research-articleJanuary 2019
Error free backbone tree construction to expand the longevity of wireless
International Journal of Networking and Virtual Organisations (IJNVO), Volume 21, Issue 1Pages 76–88https://doi.org/10.1504/ijnvo.2019.101149Wireless sensor networks (WSN) raises number of the challenges with regard to scalability and energy efficacy. Implemented of Huffman approaches one of the key variable length in the wireless sensor network is prolonging network lifetimes. To improve the ...
- ArticleSeptember 2018
Retracted on March 1, 2022: Video Watermark Algorithm Study of Shot Segmentation Based on Motion Vector
- Gao Shang,
- Ma Ruiwen,
- Huang Jianwen,
- He minnuo,
- Lin Qiang,
- Huang Kaitong,
- Zeng Chuyang,
- Xiao Jianyi,
- Huang Jutao
IHIP 2018: Retracted on March 1, 2022 Proceedings of the 2018 International Conference on Information Hiding and Image ProcessingPages 39–42https://doi.org/10.1145/3292425.3292437NOTICE OF RETRACTION: While investigating potential publication-related misconduct in connection with the IHIP 2018 Conference Proceedings, serious concerns were raised that cast doubt on the integrity of the peer-review process and all papers published ...
- ArticleJuly 2015
or: How I Learned to Stop Worrying and Love Cloud Computing
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 03Pages 139–140https://doi.org/10.1109/COMPSAC.2015.330In this paper, several aspects according to Thoman Bittman of Gartner Inc., NIST, Eric Schmidt, Peter F. Drucker and Norbert Wiener are introduced. Even it refers to social responsibility of engineering and technologies. Why we are worrying the cloud ...
- ArticleJuly 2015
Segmentation of Forensic Latent Fingerprint Images Lifted Contact-Less from Planar Surfaces with Optical Coherence Tomography
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 03Pages 30–34https://doi.org/10.1109/COMPSAC.2015.166Lifting latent fingerprints through means that do not make contact with the surface where the fingerprint is imprinted, is advantageous in many ways. Some of these advantages include: being able to lift the print multiple times, there is no physical or ...
- ArticleNovember 2014
Concurrent Editing of Styling and Structure of Auto Body Based on Metamodels
ICDH '14: Proceedings of the 2014 5th International Conference on Digital HomePages 331–336https://doi.org/10.1109/ICDH.2014.69Simulation-driven design can integrate the analysis and design together to provide a large amount of design knowledge at the early design phase, but at a cost of iterating between analysis and design. Because the heterogeneity of data representations in ...
- ArticleOctober 2014
Integral Memory Cubes
SORUCOM '14: Proceedings of the 2014 Third International Conference on Computer Technology in Russia and in the Former Soviet UnionPages 89–91https://doi.org/10.1109/SoRuCom.2014.27The report focuses on the fate of integral ferrite memory cubes that were created by a team led by two Americans: Alfred Sarant and Joel Barr, whom we have known all our life as Philip Georgievich Staros and Josef Veniaminovich Berg.
- ArticleSeptember 2014
Optimal Coverage with Reliability Using Static Sensor Networks
IMCCC '14: Proceedings of the 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and ControlPages 873–876https://doi.org/10.1109/IMCCC.2014.183In this paper, we mainly investigate the optimal coverage with reliability using static sensor network in multiagent systems by using the Lasalles's principle.
- ArticleAugust 2014
Vehicle Network Dynamic Trust Model (VNDTM)
ICVRV '14: Proceedings of the 2014 International Conference on Virtual Reality and VisualizationPages 92–96https://doi.org/10.1109/ICVRV.2014.62In the paper, a vehicle network dynamic trust model will be come true. And a trust value evaluation method, which integrates many factors, is designed. Through the vehicle network, the model could expand road conditions with trust values to vehicle ...