


default search action
AIIPCC 2022: Kunming, China
- International Conference on Artificial Intelligence, Information Processing and Cloud Computing, AIIPCC 2022, Kunming, China, August 19-21, 2022. IEEE 2022, ISBN 978-1-6654-6287-7

- Yihang Ma, Jirong Wang:

Simulation analysis of human-machine model dynamics based onADAMS. 1-5 - Guangyao Sun, Liang Zhang, Xiangdong Meng:

Beamforming of Frustum of a cone Conformal Array Based on Convex Optimization Theory. 6-10 - Wu Lan, Changjian Liu, Xiaoming Liao, Shan Cao, Bin You, Yi Hu:

Research on Signal Integrity Technology of Missile borne Integrated Control Unit. 11-15 - Zheming Zhang, Yunjian Li, Aoran Shen

, Jiajun Hu:
An Intelligent Network Intrusion Detector Using Deep Learning Model. 16-19 - Yiteng Zhang, Meng Wang, Bolin Zhou, Xin Hu, Dongze Zhang:

Design and Implementation of DSpace Using OpenSCENARIO to Construct Scenarios in Vehicle Simulation Testing. 20-23 - Wenjing Hu:

An Improved Simulation Model of Duffing Oscillator with Lyapunov Characteristic Exponents. 24-27 - Kai Liu, Dazhu Yan, Yaojing Yang, Xin Lu, Min Zhao:

A Novel End-to-End Object Detection Model Based on Multi-scale Deformable Attention Module. 28-31 - Qing Hua, Zhenyuan Xu, Lina Huang, Huanyu Wang, Lu Zhang, Yuxiang Feng:

IPM Modeling Approach for Dynamic Simulation. 32-36 - Yuhang Ding, Wenrong Jiang:

Intrusion Detection Method Based On Improved Conditional Generative Adversarial Network. 37-40 - Qing Hua Guo:

Research on soft start of DFB laser temperature control system. 41-45 - Xiaojuan Chen, Xuejiao Pan, Guohua Li:

A residual combined attention mechanism based on U-Net network for kidney tumor image segmentation. 46-49 - Junya Huang, Zhihua Liu, Zhongmin Zheng, Xuan Wei, Man Li, Man Jia:

Research and Development of Intelligent Protection Capabilities Against Internet Routing Hijacking and Leakage. 50-54 - Naichao Chang, Qiaoxia Zhang, Zongjun Mu, Jianglin Li, Zhe Chen, Xin Xu:

AKPAVF: an Automatic Kernel Patch Applying and Verification Framework based on Virtualization. 55-62 - Dongyi Fan, Pengling Zhang, Suqiong Zhang:

ECIP: An Edge Cloud Intelligent Platform for Radio Access Network. 63-66 - Tong Wang:

Fault Simulation of A320 Aircraft Generator Based on Directed Graph. 67-73 - Yuyan Guo, Wenjun Ma:

Improvement of Energy Detection with Cooperative Sensing. 74-78 - Guanghui Zhang, Wenzhen Lu, An Dong, Zhijing Xu:

Automatic control system of wind power generation in mountain area based on Internet of Things technology. 79-82 - Shenglong Zou:

Research on Cascade Power Dispatching Based on artificial intelligence learning model. 83-86 - Feng Liu, Peiwei Wang:

Research on Personnel Precise Positioning System Based on UWB Technology. 87-90 - Jiyuan Zhang, Ying Zhou, Xiaofang Zhao, Jinyong Chen, Yun Wang:

Research on Cost Risk Assessment Method of Power Grid Engineering Based on LEC Method and Fuzzy Theory. 91-94 - Han Liu, Zhenghao Li, Xiuqiang Li, Xia Xu:

Design and Application of Intelligent Internet of Things Architecture Based on Digital Twin. 95-98 - Chunmei Hu, Yunhui Zhang, Guofang Xia, Xi Liu, Xinjian Ma:

Automatic Classification of Ancient Building Components Based on PointNet++. 99-103 - Bin Wang, Xiang Meng Fang, Zhu Zeng:

Risk Assessment and Early Warning Model of University Network Public Opinion Based on Dynamic Comprehensive Evaluation Method. 104-107 - Hui Feng, Xinghui Yin, Zhe Chen, Hui Feng:

Underwater salient object detection based on frequency-tuned. 108-111 - Feng Liu:

Multi-node Monitoring of Jujube Diseases and Pests Based on Internet of Things Technology. 112-115 - Yujia Shang:

Robust control of temperature parameters for high-precision calibration. 116-119 - Ge Chen, Chaofeng Huang, Tianyi Wang, Jiahui Wang:

College classroom attendance and teaching evaluation method based on face recognition. 120-124 - Ying Zheng, Xueying Zu, Yawen Deng, Dao Zhang, Zhinan Zhou, Yuran Liu:

Research on Capturing Random Burst Signals of Power Satellite Internet of Things. 125-132 - Shibei Xu:

Research on infrared detection and intelligent identification technology of oil and gas pipeline leakage. 133-136 - Liqing Shao, Haipeng Cao, Jing Yang:

Necessity of Regional Coordinated Development of New Energy Vehicles Based On System Dynamics Model. 137-140 - Jinzhang Jin, Yong Shi:

Micro-grid Power Conversion Control Method Based on Single-phase Isolated Energy Storage Converter. 141-144 - Xianju Wang, Ronald S. Cordova:

Heterogenous Center Alignment of Dual-Path Features for Text-Image Person Re-identification. 145-148 - Hao Chen, Xian Li, Kai Ma, Changnian Chen:

Flight cockpit gesture recognition based on YOLOv7. 149-154 - Mengyang Li, Shi Huang, Yingti Liu, Zihao Chen:

Game Storyboard Script: A Fast Camera Placement Tool for Cinematographic Information Processing. 155-160 - Min Zhao, Yaojing Yang, Kai Liu, Dazhu Yan, Zhonghua Liu:

A Object Detection Model with Multiple Data Enhancements. 161-164 - Youliang Gao, Chaosheng Huang, Xinyang Zhang, Xingyu Xiang, Weiwei Zheng:

Application of Internet of things in data aggregation system of electric power construction equipment. 165-168 - Zhao Hu, Sanbo Pan:

Research on Modulation Strategy of T-type Three-level Inverter. 169-173 - Long Wang, Cuilian Zhao:

Design of EMG and FMG multi-sensing acquisition system for lip muscle training. 174-177 - Xin Guo, Qinghua Yao, Xiaofeng Zhang, Xinrui Liang:

Error Correction of Modulation Transfer Function in High Resolution Imaging System by Improved Slanted- Edge Method. 178-183 - Xinyu Zhou, Guifen Chen, Ying Hu, Xinzhou Li:

D2D interference management and resource allocation scheme based on improved graph coloring. 184-187 - Dazhuang Liu, Zhen Yang, Ru Zhang, Jianyi Liu:

A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping. 188-191 - Shuoyang Gao, Changxin Nai, Jingcai Liu, Hongjian Bian:

The development of the portable leakage detector data acquisition device. 192-197 - Guo-Jun Lai, Yi Liang, Xiao-Wei Wang:

Task and State Oriented Optimization of Helicopter Air-to-Ground Communication Network Reconfiguration. 198-202 - Qizheng Huo, Shaonan Li, Yongqiang Xie, Zhongbo Li:

Horizontal Pod Autoscaling based on Kubernetes with Fast Response and Slow Shrinkage. 203-206 - Dan Wang, Xue Yang, Li Xu:

Design of Launch Vehicle Test Information Management System based on IETM. 207-210 - Zhongfeng Pan, Wencheng Che, Xiaolong Liang, Yibo Zhang, Xiang Du:

Fault segment location method based on CEEDMAN-Energy Relative entropy. 211-214 - Xi Song, Wenpeng Gao, Xuyang Wang, Yaling Yun, Xiao Zhang, Ran Li:

TDOA/FDOA Joint Positioning Method for Wireless Charging Vehicle. 215-220 - Fuzhan Yue, Zhiying Cui, Shenyang Li, Hui Jing, Shuangna Zhang, Meng Wang:

A Satellite Augmentation System based on LEO mega-constellation. 221-225 - Lin Chen, Xiao Zeng, Di Li:

A two-stream attention mechanisms network. 226-230 - Yanhong Jian, Haifeng Zhang, Honggang Wang, Hanmei Ma:

Research on Power Grid Condition Monitoring Method Based on Big Data. 231-234 - Yang Zhong, Wanhe Du, Shuzhen Yang, Xueping Zheng, Tao Yu:

Feature extraction and multi-period classification of sea mushroom based on image information. 235-238 - Lu Wang, Chenye Zhang, Tian Xie, He Li:

Research on Data driven Communication Network Situation Awareness System. 239-242 - Kaiyun Dong, Zhao Yi, Tao Jia, Shiqiang Wu:

2.4GHz wide band high efficiency rectenna with three sector branches. 243-248 - Bo Hu, Bolin Qi, Qiang Cui, Daosheng Sun, Jifang Shen, Lianjun Gao:

Design and Research of Power Engineering Material Online Management Platform Based on the Internet of Things. 249-252 - Chenxi Xia, Wanlu Dai, Dong Li, Fengling Li, Kai Liu, Zhijie He:

Multi-influenced Factors Prediction Using a Combination of GEP and PCA-GRNN Model Based on the Shapley Value Method. 253-259 - Fulin Li, Chen Meng, Cheng Wang, Shuyi Fan:

Data mining for risk prediction of diabetes mellitus. 260-263 - Chaoyue Xu, Penghao He, Ying Yu:

Pyramid Structure-Based Context Aggregation Detail Restoration Low-illumination Image Enhancement Network. 264-269 - Sheng Peng, Linkai Zhu, Jiadong Lu, Renhui Tian, Shiyang Song, Wennan Wang:

An Optimizing E-govenment Model for Data Sharing via Distributed Ledgers. 270-274 - Feng Liu:

University Intelligent Teaching Information Processing Management Platform Based on Resource Clustering Method. 275-278 - Cuifang Zheng, Jiaju Wu, Zheng Cheng, Linggang Kong, Shijia Kang, Bin Luo:

Research on IETM Data Publishing. 279-284 - Lixiang Shen, Lijin Wu, Jingdong Guo, Wenliang Liu, Wen Ji, Qian Chen:

A vulnerability scanning and verification system for power information systems. 285-289 - Hongliang Tang, Da Lyu:

Analysing Management Data through Cascade Additive Noise Models from Shanghai Scenario. 290-293 - Qunyi Chu, Shihua Liang, Mingrui Yang:

Visibility Analysis in Fog Weather Based on Convolution Neural Network and Transfer Learning. 294-298 - LaLao Gao, DingJun Zhang, MingChao Liao, ZhiQiang Huang:

Multivariate time series prediction based on graph convolutional neural networks. 299-303 - Haotian Liu, Jie Zhang

, Wei Liu:
Optimisation and research of Los Angeles communication network hotspots based on machine learning and social software data. 304-309 - Zhengxiong Mao, Hang Zhang, Hui Li, Zuyuan Huang, Yuan Tian, Xiaoping Zhao:

A Federated Deep Reinforcement Learning-based Approach to Secure Resource Allocation in Power Communication Networks. 310-315 - Zhonglin Li, Zijing Cheng, Yan Wang:

Parameter Tuning of Active Disturbance Rejection Control Based on Improved Snake Optimization Algorithm. 316-322 - Shaoguo Cui, Yunan Zhang, Hao Wen, Yibo Tang, Haixiang Wang:

ASPP-UNet: A New Semantic Segmentation Algorithm for Thyroid Nodule Ultrasonic Image. 323-328 - Huiying Liu, Zhimin Chen, Wei Pu, Lulu Fang:

A Data Analysis Method of Military Training Performance Based on Apriori Algorithm. 329-332 - Chen Chen

, Gang Chen:
Computer network system security assessment method. 333-336 - Shan Jiang, Jian Qi, He Lei, Li Zhu, Li Zhou:

Equipment selection method and application of power grid infrastructure project based on particle swarm algorithm. 337-341 - Chengqiong Ye, Mali Sun, Yang Chen:

Research on Key Technologies of Network Intrusion Detection Based on Machine Learning. 342-349 - Mengxuan Li, Jingshan Han, Lei Gao, Zhi Yang, Yangzhe Chen, Liu Huang:

Research on Fatigue Assessment Algorithm based on ECG and Multi-source Physiological Signals. 350-355 - Jihui Fan, Fengshan Yuan:

Recognition of Junk Short Messages Based on Local Sensitive Hash KNN Algorithm. 356-359 - Shan Jiang:

Prediction of regional ecological security by applying deep learning methods in spatial and temporal simulation. 360-363 - Zipeng Chen:

Research on the Application of LSTM Model Based on Electrical Equipment in Electromagnetic Field Calculation. 364-367 - Mixue Zhu, Zhiqiang Liu, Xu Zhang, Wenjing Li, Jiaxin Su:

YOLOv5 Improved Smoke Detection Algorithm *. 368-373 - Baoqiang Zhong, Yikai Tan, Wei Wang, Weihong Cui, Zehan Cai, Lai Wei, Qian He:

Research on the identification of network traffic anomalies in the access layer of power IoT based on extreme learning machine. 374-378 - Yuehua Song, Xin Li, Chen He, Xuying Fan, Yuyao Feng, Jize Wei, Kai Yu, Zichun Zhao:

Research on computer vision-based inspection of tiny parts. 379-383 - Ming Zhang, Qingxing Li:

Research on insulator detection algorithm of YOLOv5 fused with attention mechanism. 384-388 - Shangping Kong, Luoning Gan, Ruofan Wang, Guozhe Zhou:

Target Tracking Algorithm of Radar and Infrared Sensor Based on Multi-Source Information Fusion. 389-392 - Xuesong Su, Huifang Song, Yifei Wang, Mei Wang:

A short text topic classification method based on feature expansion and bi-directional neural network. 393-397 - Huilong Zhu, Jing Zhang, Li Hu, Chenghao Li, Maomao Shan, Qiyu Duan:

Data Augmentation Algorithm Based on Local Dynamic Transformation. 398-404 - Huazhang Liu, Jun Zhang, Zhongli He, Shunjie Lin:

Research and Implementation of UWB Data Transmission Algorithm for UAV Formation Flight Control. 405-408 - Yaofu Cao, Tianquan Li, Xiaomeng Li, Jincheng Zhao, Junwen Liu, Junlu Yan:

Research on network security behavior audit method of power industrial control system operation support cloud platform based on FP-Growth association rule algorithm. 409-412 - Xiyue Wang:

Research on Intelligent Garbage Classification Algorithm Based on Deep Learning. 413-416 - Dongsheng Xiang, Baisong Zhu, Xu Wu, Yangfei Ou:

Safety helmet detection algorithm in complex scenarios based on YOLOX. 417-421 - Xiangyu Mao, Zhida Zhang

, Kewei Zhang, Xiqiang Jia, Huiqin Shao:
Anomaly Detection based on Teacher-Student Network in the field of Security Document Production. 422-425 - Yueming Chen, Xinhui Xu

, Caiying Huang, Wenhua Yao:
Selection of Prediction Factors of Gross Primary Productivity Based on Artificial Neural Network. 426-429 - Huijun Ni, Yingjue Ma:

Research on "scenario assessment+" action mode applied in agile talent training with k-prototype algorithm. 430-433 - Yikai Sun, Dong Yuan, Ming Gao, Penghui Zhu:

GPU Acceleration of Monte Carlo Tree Search Algorithm for Amazon chess and Its Evaluation Function. 434-440 - Miantao Ma, Zeting Chen, Zhou Fang, Haoyu Xu:

Classification algorithm of streaming media big data fusion under multi-task information filtering. 441-446 - Yali Zhang:

A multi-system collaborative data security and cross-domain authorization mechanism based on domestic cryptographic algorithms. 447-450 - Yazhong Chen, Heng Shan, Haoran Wei:

Research on communication signal interference suppression based on deep learning. 451-454 - Zhaoke Li, Shuwei Xu:

A Study of User-item Graph Neural Network Recommendation Based on GCCGAT-LSTM. 455-457 - Hongtao Li:

Network Security Situation Awareness Based on Particle Swarm Optimization of Gated Cycle Unit. 458-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














