Search Results - "2021 3rd International Conference on Applied Machine Learning (ICAML)"

Refine Results
  1. 1

    File Text Recognition and Management System Based on Tesseract-OCR by Ma, Tao, Yue, Min, Yuan, Chao, Yuan, Haibo

    “…Through the research of image preprocessing technology, this paper designs and implements a web archive file recognition management system based on open source…”
    Get full text
    Conference Proceeding
  2. 2

    Emotional Analysis of Clothing Product Reviews Based on Machine Learning by Hong, Ying, Shao, Xiwen

    “…Emotional analysis of product reviews is a hot spot in current data mining research. Whether it is in academic or economic fields, text emotional analysis of…”
    Get full text
    Conference Proceeding
  3. 3

    Comic Text Detection and Recognition Based on Deep Learning by Xin, Hong, Ma, Chi, Li, De

    “…In recent years, there are a variety of methods for detecting comic characters or avatars for research in the field of comic digitization, leading to efficient…”
    Get full text
    Conference Proceeding
  4. 4

    Time Series Search Based on Locality Sensitive Hashing by Zhang, Mengru

    “…The application of similarity search in large-scale data of time series is very common. It is also the main subroutine of the time series data mining…”
    Get full text
    Conference Proceeding
  5. 5

    Decoupling Control of Distillation Column Based on Active Disturbance Rejection Control by Pu, Cuiping, Ren, Jie, Yu, An

    “…Distillation tower process is a typical multivariable system, which has the characteristics of time-varying, coupling and time-delay. For multivariable…”
    Get full text
    Conference Proceeding
  6. 6

    Improved and Comparative End to End Delay Analysis in CBS and TAS using Data Compression for Time Sensitive Network by Hasan, Md Mehedi, Feng, He, Hasan, Md Tanvir, Gain, Bipro, Ullah, Md Ibrahim, Khan, Shahrukh

    “…TSN, or Time-Sensitive Network, is a set of standards that allows an Ethernet network to be extended to serve real-time applications while ensuring…”
    Get full text
    Conference Proceeding
  7. 7

    Internet of Things Gateway Fabrication by Sun, Yandong, Fan, Tongliang

    “…The Internet of things gateway can convert protocols between sensor networks, traditional communication networks and heterogeneous sensor networks, and will…”
    Get full text
    Conference Proceeding
  8. 8

    A Survey on Neural Machine Translation Applied to Sign Language Generation by Zhang, Yue, Cao, Lihong

    “…Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is…”
    Get full text
    Conference Proceeding
  9. 9

    Convolutional Neural Network Based Smart System to aid an Epileptic Patient by Hasan, Md Mehedi, Ullah, Md Ibrahim, Feng, He, Hasan, Md Tanvir, Gain, Bipro, Khan, Shahrukh

    “…Epilepsy is a form of neurological disorder which results from the immediate change in neurological signal. Drug-resistant epileptic patients need to be…”
    Get full text
    Conference Proceeding
  10. 10

    Word Embedding-based Context-sensitive Network Flow Payload Anomaly Detection by Li, Yizhou, Wang, Yijie, Cheng, Li, Xu, Hongzuo

    “…Payload anomaly detection can discover malicious behaviors hidden in network packets. It is hard to handle payload due to its various possible characters and…”
    Get full text
    Conference Proceeding
  11. 11

    In-network Caching in Mobile Network: Research Issues and Challenges by Xu, Shilong, Fu, Kai, Jia, Qingmin, Xie, Renchao

    “…The problem of efficient content distribution in mobile network has attracted wide attentions from industry and academia. One of the significant approaches is…”
    Get full text
    Conference Proceeding
  12. 12

    Causes of Errors in Machining Process Technology and Control Strategies by Liang, Chen

    “…After the industrial revolution, the manufacture and application of mechanical production equipment have become more extensive, which has greatly improved…”
    Get full text
    Conference Proceeding
  13. 13

    Software and Hardware Integrated Accelerators for Hadoop Appliance by Meng, Yuan, Yang, Jun, Li, Jun, Wang, Shengkai, Zhang, Xiao

    “…With the development of the Internet, the data center for next-generation must be capable of data processing at PB/s level, ensuring a high throughput of the…”
    Get full text
    Conference Proceeding
  14. 14

    Research on Ring Network Structure Optimization of Medium Voltage Distribution Network Considering Load Complementary Characteristics by Mao, Yanwei, Li, Hongjun, Ding, Yudi, Jin, Qiang, Yao, Gang, Jin, Jia

    “…Distribution network is an important infrastructure of economic society. It is necessary to optimize the ring network structure reasonably and effectively. In…”
    Get full text
    Conference Proceeding
  15. 15

    Static Analytical Reasoning of Directed Cyclic Graph in the Discrete Case Weight Combination Method by Qiu, Kun, Zhang, Qin

    “…As being defined, a Bayesian Network (BN) is based on a directed acyclic graph (DAG). However, when statistical data to learn a BN are collected in a set of…”
    Get full text
    Conference Proceeding
  16. 16

    Research on Tone Perception of Tibetan Native Speakers in Mandarin Based on Acoustic Features by Hongjie, Wang, Yonghong, Li, Axu, Hu

    “…In this paper, the method of acoustic signal analysis is used to study the perception mode of Mandarin tone by native speakers of Amdo. The results show that…”
    Get full text
    Conference Proceeding
  17. 17

    Qualitative Analysis of Fault Tree Diagnosis for TCAS Data Processor by Hu, Kun, Zeng, Yong, Xie, Xiaomin, Du, Jianghuai

    “…On the basis of hierarchical fault diagnosis model, the characteristics of TCAS system are studied and a hierarchical fault diagnosis model based on actual…”
    Get full text
    Conference Proceeding
  18. 18

    Intelligent Method of Non-Invasive Detection and Grading of Hypertension Using Fingertip Photoplethysmography by Zhang, Mingwei, Zhang, Tianyi, Cheng, Yunzhang

    “…With the gradual increase in hypertension and the trend toward younger age in China in recent years, the existing detection methods for hypertension have a low…”
    Get full text
    Conference Proceeding
  19. 19

    The Principle of Firewall Technology and Its Application in Computer Network Security by Xiao, Min, Guo, Mei, Lv, Hong

    “…Computer network security is related to the development of computer applications, in the use of computer systems, the advantages of firewall technology are…”
    Get full text
    Conference Proceeding
  20. 20

    Research on the Suspension Force Model for the Large-Air-Gap Permanent-Magnet Suspension Belt Conveyor by Wang, Zhongxun, Pu, Jietao

    “…Suspension force is the most critical element that affects working performances of permanent-magnet-suspension belt conveyors. In this article, a mathematical…”
    Get full text
    Conference Proceeding