Search Results - "2022 IEEE 2nd International Conference on Computer Systems (ICCS)"

Refine Results
  1. 1

    Method of Obtaining OD Matrix for Bus Passenger Flow Based on Pedestrian Re-identification Algorithm by Liu, Xiaolei, Guo, Li, Zhang, Weizhong, Wang, Wenshan

    “…In public transport, the OD (origin-destination) matrix of each passenger's starting and ending points is of great importance for bus scheduling and network…”
    Get full text
    Conference Proceeding
  2. 2

    APT Attack Detection Method Based on Traffic Log Features by Huang, Xingjie, Su, Beibei, Zhang, Ru, Chen, Feiyu, Zhao, JinMeng, Gao, Yating

    “…APT (Advanced Persistent Threat) attack can generally hide the attack process by evading the detection of the IDS system. This paper proposes a detection model…”
    Get full text
    Conference Proceeding
  3. 3

    Sitting Posture Detection System Based on Stacking Ensemble Learning by Ji-sheng, Feng, Li, Guo, Xuan-xuan, Liu

    “…Recently, the prevalence of diseases such as myopia, hunchback and lumbar herniation caused by the long-term bad sitting posture of young people is increasing…”
    Get full text
    Conference Proceeding
  4. 4

    Saliency Detection of Logistics Packages Based on Deep Learning by Jiang, Guanhui, Zhang, Weizhong, Wang, Wenshan, Sun, Xiaoqi

    “…Aiming at the problem that parcels in the logistics industry cannot be accurately located on the conveyor belt to obtain parcel location information, this…”
    Get full text
    Conference Proceeding
  5. 5

    A NLP Application of Automated Symptom Information Extraction from TCM Medical Cases by Qiang, Cheng, Zhong-min, Du

    “…Starting from natural language processing (NLP) technology, we compare the extraction results of TFIDF and Word2vec methods to explore research ideas that are…”
    Get full text
    Conference Proceeding
  6. 6

    Analysis of the Design of Several Modern Programming Languages by Wang, Xudong, Zhang, Zhimei

    “…The design of programming languages has always been an important topic in the field of programming language theory. However, most attention on programming…”
    Get full text
    Conference Proceeding
  7. 7

    Analysis of Local Rainfall Prediction Based on Intelligent Algorithm by Wu, Shenglin, Yang, Ying, Wu, Qili, Mao, Beibei, Liu, Zhimin, Yu, Hao, Long, Mei, Ge, Shao-Ting

    “…This paper discusses the model of Indian Ocean sea area, simulates the rainfall process and the related air sea interaction process in the bay of Bengal on the…”
    Get full text
    Conference Proceeding
  8. 8

    Application of DWT-Sigmoid Entropy Feature Parameter Extraction in Gear Fault Diagnosis by Qi, Wang, Jinhua, Li, Shuaiwei, Huan

    “…After analyzing the non-stationarity and nonlinear characteristics of gear vibration signals and the problem of fault signal feature extraction, we propose a…”
    Get full text
    Conference Proceeding
  9. 9

    YOLOXD: A New Network for Metal Surface Defect Detection by Wang, Hao, Li, Mengjiao, Gao, Pengxiang, Zhang, Shumei

    “…The detection of metal surface defects is an essential part of the industrial production process. Most of the current detection methods are poorly detected due…”
    Get full text
    Conference Proceeding
  10. 10

    A Lightweight and Secure Data Sharing Scheme for Mobile Device in Cloud Computing by Wang, Xin, Lu, Xiuqing, Lu, Quanli, Wei, Ning

    “…With the developing of cloud computing, an increasing number of businesses are apt to store the big data on cloud servers and share it effectively with users…”
    Get full text
    Conference Proceeding
  11. 11

    Insulator Pollution Grade Recognition Method and Platform by Huang, Qingdan, Wang, Hongbin, Liu, Jing, Huang, Huihong, Wei, Kaiqing

    “…Insulators play an important role in the power grids. However, when they get polluted, the flashover phenomenon may take place, which will bring huge losses to…”
    Get full text
    Conference Proceeding
  12. 12

    SLIC Research and Implementation of a Parallel Optimization Algorithm by Xiaomin, Shang, Qiang, Li, Yongmeng, Qi, Shunan, Tao

    “…SLIC is an image segmentation method that clusters picture pixels into superpixel blocks. But it has many flaws, including large amount of computation and high…”
    Get full text
    Conference Proceeding
  13. 13

    A Covert Communication Method Combining Secret Sharing and Steganography by Yan, Peizheng, Wang, Kaixi, Jia, Xiaozhu

    “…In the distributed environment, when all parties carry out the cooperative computing, there are problems of low scalability and privacy leakage. To solve the…”
    Get full text
    Conference Proceeding
  14. 14

    Detection of Turn-to-Turn Short Circuit Fault of Permanent Magnet Synchronous Motor Based on Wavelet Packet Transform and KNN by Shuaiwei, Huan, Jinhua, Li, Junli, Zhao, Yujie, Zhang, Qi, Wang

    “…A fault feature extraction and fault diagnosis method based on wavelet packet transform and KNN classification algorithm is proposed for the problems of…”
    Get full text
    Conference Proceeding
  15. 15

    A Novel Demand Response Potential Assessment Method for Industrial Users by Guan, Shaofeng, Zhuo, Huidan, Yang, Kuangli

    “…Power companies or load aggregators can reasonably call demand-side resources through accurate user demand response potential assessment, which can improve the…”
    Get full text
    Conference Proceeding
  16. 16

    Formal Modelling and Visualization of Elevator System Based on Event-B by Yao, Ju-Yi, Zou, Sheng-Rong, Geng, Xue

    “…When designing complex systems with high security requirements, it is essential to use reliable formal modeling methods to verify whether the resulting system…”
    Get full text
    Conference Proceeding
  17. 17

    Resource Deployment and Task Scheduling Based on Cloud Computing by Sun, He

    “…Cloud computing is a computing model developed from parallel computing and distributed computing. The rapid development of cloud computing technology not only…”
    Get full text
    Conference Proceeding
  18. 18

    Subway Water Leakage Detection Based on Improved deeplabV3 by Li, Mengjiao, Wang, Hao, Zhang, Shumei, Gao, Pengxiang

    “…At present, water seepage problems in subway tunnels are not uncommon, and the detection and prevention of water seepage diseases have become a hot issue in…”
    Get full text
    Conference Proceeding
  19. 19

    Design and Implementation of Music Recommendation System Based on Big Data Platform by Lin, Yongri

    “…With the development of network technology, music recommendation system has also developed rapidly, and online music platform has become the first choice for…”
    Get full text
    Conference Proceeding
  20. 20

    Mathematical Image Analysis of Light Fused with Computer Fuzzy Algorithm by Tang, Jianmin

    “…The fuzzy mathematics theory was born in 1965, and it takes uncertain things as the research object. In recent years, the research on fuzzy mathematics theory…”
    Get full text
    Conference Proceeding