Stop the war!
Остановите войну!
for scientists:
default search action
CNIOT 2024: Tokyo, Japan
- Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things, CNIOT 2024, Tokyo, Japan, May 24-26, 2024. ACM 2024, ISBN 979-8-4007-1675-1
- Ye Xiao, Yupeng Hu, Jiangjin Yin, Yi Xiao, Hanmin Jiang, Qianzhen Liu:
Attention Mechanism-based Forward and Backward Data-Driven Method for Ship Trajectory Prediction. - Yifan Yang, Wentao Hong, Zhuang Ma, Lizhou Wu, Yang Ou, Jie Shen, Nong Xiao:
Architectural Design of High-Capacity Cache Based on MRAM Technology. - Yimi Chen, Xianghan Zheng, Yichen Zhan:
Semi-asynchronous federation optimization method based on buffer pre-aggregation. - Yangyang Wang, Zekun Jia, Ruimeng Gan, Jin Li, Zhe Xiao:
Evaluate Link Quality based on ISSA-BRF in Wireless Network. - Jinlong Li, Ying Li:
Recognition of mild-to-moderate depression based on facial expression and speech. - Yifeng Wan, Wenting Wang, Jiajun Sun, Donghai Tian:
Directed Fuzzing Based on Bottleneck Detection. - Qiyang Zhou, Hengguang Liu, Wanting Hou, Yanhui Duan:
Two-Step optimization based on CST-cGANs for airfoil inverse design. - Wenchu Li, Huiwei Zhou, Weihong Yao, Lanlan Wang:
Biomedical temporal knowledge graph reasoning via contrastive adversarial learning. - Baojie Liu, Weihong Yao, Huiwei Zhou:
Logic Rule Guided Multi-hop Temporal Knowledge Graph Reasoning. - Liu Zhang, Xuehui Du, Aodi Liu:
Image data confirmation method based on security watermarking and blockchain. - Dongzhen Sun, Xu Chen, Kexian Gong, Peng Sun, Wei Wang, Fasong Wang:
A Novel Joint Carrier Parameter Estimation Algorithm Based on Double Fields for DVB-S2X Signals. - Xinyu Su, Shuyu Zhao, Chunxiao Cai, Weigang Zhao, Yingbin Wang, Weiwei Wang, Chongdi Duan:
Learning Word Embeddings by Incorporating Latent Meanings of Chinese Characters, Radicals and Sub-characters. - Subin Wang, Wenjie Chu, Litong Su, Junyi Yang, Jianbo Zhu, Yang Huang:
Fast Landmark-Based Optimal Routing for BGP-ORR Protocol. - Jier Wang, Hongmei Ren, Chunzhu Dong:
Multi-Domain Joint Approach for Feature Extraction of Aerial Rotorcraft Targets. - Mitch Arkeen Salvador, Khavee Agustus Botangen, Mary Camille Rabang, Ivan Christian Salinas, Marlon A. Naagas, Angelika Balagot:
Development of a Web-based Research Consortium Database Management System: Advancing Data-driven and Knowledge-based Project Management. - Shaopeng Xie:
Research on Financial Report Text Information of Listed Companies Based on BERT Model. - Meixin Chen:
Integrating Efficient Threshold Signature in Marketplace Transactions to Realize Anonymity and Traceability. - Theresia Fabian Mwita, Cui Xie, Junyu Dong, Yabin Li:
STCANetViz: A Visual Analytics Framework for Optimizing an Ocean Currents Prediction Model STCANet. - Ronghui Pang:
Research on Text Classification Applications Based on NLP Technology. - Xiang Guo, Yinggang Hu, Chuyi Song, Fang Zhao, Jingqing Jiang:
An improved sparrow search algorithm based on multiple strategies. - Minhui Tong, Ying Liu, Suyun Wu, Yuhang Ye:
Process Optimizations of Publishing Industry in Era of "Big Data Intelligence". - Peng Li, Zhiqi Liu, WeiJian Pang, Jiang Cao:
Semantic Collaboration: A Collaborative Approach for Multi-Agent Systems Based on Semantic Communication. - Yuchen Hong, Yu Cao, Yongsheng Luo, Lefan Guo, Xianchao Sun, Zhiyao Sun, Yu Zhao, Gangfeng Liu:
An Intelligent Mechanism for Polar Snow Sample Collection, Transportation, and Portable Storage. - Lun Lin, Yinghui Jin, Wenxin Hu:
Prognostic Survival Prediction of Patients with Liver Cirrhosis based on Radiomics Data and Clinical Features. - Lihan Tong, Yun Liu, Tian Ye, Weijia Li, Liyuan Chen, Erkang Chen:
Parallel Cross Strip Attention Network for Single Image Dehazing. - Chaoyi Huang, Chunming Yang, Yingjie He:
Using interpretable machine learning techniques to analyze the thermal decomposition behavior of high-energy compounds for dataset partitioning. - Yulin Li, Yiming Gu, Tuo Guo, Jiachen Kang, Bingrong Xu:
A Multi-Frequency Memory Network for Short-Term Electricity Load Forecasting. - Yuxing Wang, Nan Liu, Zhiwen Pan, Xiaohu You:
Dynamic Resource Allocation for E2E Network Slicing with Both Public and Non-Public Slices. - Yucheng Wu, Shuxin Wang, Xianghua Fu:
mWDN-Transformer: Utilizing Cyclical Patterns for Short-Term Forecasting of Limit Order Book in China Markets. - Yufan Zhang, Yaojiang Wu, Junjie Wang, Bokun Liu, Aodi Liu, Xiaowei Chen:
Blockchain Query Framework Based on Trusted Execution Environment. - Yunyi Xiang, Zheng Wu, Haidong Yao, Xiankui Xiong, Fan Yang:
Aries: A DNN Inference Scheduling Framework for Multi-core Accelerators. - Hailan Wang, Yiyi Jiang, Huiwei Su:
Prediction of tourist flow in scenic spots based on network attention: A case study of SiGuNiang Mountain Scenic Area. - Chao He, Rong Liu, Jinxuan E, Ming Liu:
Image-based Virtual Try-on via Channel Attention and Appearance Flow. - Wangqun Lin, Jing Xu, Yu Tian, Baoyun Peng, Yan Li, Yawei Ge:
Cognitive Intelligence: Driven by Knowledge Graph and Big Model Collaboration. - Haozhe Shi, Kun Niu:
Enhancing Persona Consistency with Large Language Models. - Wenhui Chen, Yu Zhang, Pengcheng Guo, Moran Ju, Qing Hu:
Ship Detection with Optical Image Based on Swin-YOLOv5 Network. - Hua Deng, Kang Xu, Rongsheng Li, Yifei Qi:
Chinese Text Error Correction Based on PE-T5 Model. - Xia Wu, Hua Deng, Lina Bao, Haoyi Cui, Wei Liu:
News text continuation based on Topic Similarity Evaluation Module. - Yunxiao Lin, Jiahao Tang, Wenjun Huang, Yanyu Ding, Jianguo Hu:
Chinese Named Entity Recognition for IC Patent Domain Based on RoBERTa-wwm-ext, GCN and Efficient Global Pointer. - Shiqing Hou, Wenhui Li, Tianyuan Huo:
Simulated experiments on diesel engine speed control based on LSTM-PID control. - Dongsheng Guo, Zizhong Wei, Rui Li, Xue Li, Kai Jiang, Lei Dong, Daibang Wei, Qiang Duan:
Hand Enhanced Video Matting. - Guangxin Wang, Xue Li, Dongshen Guo, Qiang Duan, Qibin Chen, Kai Jiang, Rui Li, Zizhong Wei:
Zero-shot Behavior Detection Based on Multimodal Large Language Model Expansion. - Lin Li, Haili Zhao, Rongxin Mi, Weikuang Li, Zixuan Chen, Shenwen Lin:
Research on PoW Mining Flow Monitoring Based on Multidimensional Feature Analysis. - Xiaofei Guo, Xi Zhao:
Oriented-YOLOX: An Improved YOLOX for Rotated Object Detection. - Huafeng Xue, Jilin Chen, Ruichun Tang:
Improved YOLOv8 for Small Object Detection. - Shouzheng Sun, Qianhan Tang, Yanan Liu, Hao Zhang, Qianyun Song, Dan Xu:
YNU-Dance: A Multimodal Ethnic Dance Action Dataset. - Chujia Lin, Yiqi Liu, An Chen, Hongxia Gao:
Self-supervised Recurrent Visual Odometry, Depth Estimation, and Instance Segmentation. - Yunge Cui, Yingming Hao, Qingxiao Wu, Qun Wang, Jianyu Wang, Pengfei Zhao, Feng Zhu:
An Optimized RANSAC for The Feature Matching of 3D LiDAR Point Cloud. - Wenbiao Zhou, Yunfei Jia, Luyao Fan, Gongyu Fan, Fengchi Lu:
Adaptive fringe projection algorithm for 1-D MEMS projector. - Atika Humayra, Md Maruf Kamran Sohag, Mohammed Anwer, Mahady Hasan:
Sentiment Analysis of Bengali Music based on various Audio Features: An analysis of Machine Learning and Deep Learning Methods. - Tianxiang Li, Hui Ma:
ML-Unet: Performing Retinal Segmentation by Integrating Frequency Domain Information. - Jawad Tawhidi, Mei Wang, Yunhua Wen:
Enhanced Unsupervised Ultrasound Video Object Segmentation through Multi-scale Feature Fusion. - Gang Liu, Zhandong Liu, Yuan Ren, Haifang Li, Nan Ding, Ke Li:
CSCNet: Cross-stage Shiff Convolution Network for Object Detection. - Wanwan Li:
PM4Fashion: A Scriptable Parametric Modeling Interface for Conceptual Fashion Design Using PM4VR. - Yu Zhang, Wenqiang Li, Pengcheng Guo, Jiabing Liu, Qing Hu:
Ship-YOLOv5: Ship Target Detection Based on Enhanced Feature Fusion. - Shimeng Hou, Yiqi Zhang, Wenlong Zhai, Shouyou Huang, Lingyu Si, Linjuan Cheng:
TD-YOLO: Taylor-Attention based Dehazing for Enhanced YOLO Detection Performance. - Shaode Yu, Hao Cheng, Jiayi Wang, Mingxue Jin, Bing Zhu:
No-reference image sharpness assessment via elastic net based mid-level feature selection. - Weicheng Hu, Cui Xie, Junyu Dong, Xiaofeng Chang, Yabin Li:
Training Evaluation in Sailing Simulator. - Yihang Li, Zhimin Lv:
A multi-strategy fusion dung beetle optimization algorithm. - Ziqiang Qiu, Chenggui Zhao:
eMBB-URLLC Resource Slicing: A contract-based pre-scheduling mechanism. - Yunlong Li, Weiwei Zeng, Lei Li:
HiDRNet: Hiding image with Deep Reversible Network. - Guoqing Tian, Xilong Wang, Xin Li, Xiaolin Qin:
Multi-Task Resource Allocation and Task Offloading via Multi-Agent Deep Reinforcement Learning in Edge-Cloud system. - Aicha Aiche, Pierre-Martin Tardif, Mohammed Erritali, Thibaud Ecarot, Abderrahim Rafae:
Optimizing Safety In IoT Water Plants: From Critical Importance To Innovative Solutions. - Xingjian Wang, Xiaomei Chen:
An improved deep Q-Network algorithm for the prediction of non-competitive bidding in Bridge Game. - Jianghao Wei, Wei Huang, Tao Hu, Qiang Liu, Jie Yu, Xiaoqiu Duan, Jiahuan Huang:
LED-DETR: Lightweight, Efficient and Decoupled Object Detection with Transformers. - Yijie Ma:
Design and Application of a Postal Finance Customer Classification Model. - Silu Lyu:
SC2SLR: Skeleton-based Contrast for Sign Language Recognition. - Nan Xiao, Wenjie Ye, Lin Yu, Dong Lu, Jie Zhang:
A Method for Identifying Key Nodes Based on an Improved K-shell Algorithm. - Jiajia Zhu, Chao Qi, Jian Chen, Jiagui Xie:
Study of Deployment and Service Level of DNS Root in India. - Tias Amalia Safitri, Asep Saefuddin, Sachnaz Desta Oktarina:
Analysis of Air Quality in Indonesia Using Tensor Decomposition-Based Clustering. - Lingjie Zou:
Popularity and Energy-Aware Dynamic Programming Cache Strategy Based on User Preference Prediction. - Tushir Sahu, Dhirendra Narad, Nava Krishna Chaitanya Javvaji, Sai Chandra Teja Radhapuram:
Location based portable 5G enabled Internet of Things IoT EDGE device to measure, monitor and manage environment sensor data. - Sunrui Zhou:
Chinese cyber-violent Speech Detection and Analysis Based on Pre-trained Model. - Yao Wang, Linlan Liu:
Wireless Link Quality Prediction Based on Temporal Convolutional Networks and Self-Attention Fusion. - Zhongqi Jiang:
Comparative Analysis of Cryptocurrencies from the Perspective of Complex Networks. - Chengxi Li:
An Improved UNet Network Model for Segmentation and Recognition of Minor Lesions in Fundus Images. - Jiaxing Fan, Chenghan Zhang, Yan Liu:
Discovering stable communities in massive temporal graphs. - Zhiyuan Liang, Tianzheng Li, Enfang Cui:
RISC-V Virtualization: Exploring Virtualization in an Open Instruction Set Architecture. - Cheng-Hsing Yang, Chi-Yao Weng, Chia-Ling Hung, Shiuh-Jeng Wang:
Multi-level Block Differencing Approach for Reversible Data Hiding in Encrypted Images. - Guan-Yu Wang, Hung-Jui Ko, Chang-Po Chiang, Wei-Jen Wang:
WebShell Detection Based on CodeBERT and Deep Learning Model. - Hao-Yu Weng, Cheng-Ta Huang, Shiuh-Jeng Wang, Cheng-Hsing Yang, Chang-Po Chiang:
A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding Mechanisms. - Changpo Chiang, Cheng-Ta Huang, Yung-Lien Lai, Shiuh-Jeng Wang:
The Study of More Susceptible to Fake News Makers with Influencing Factors in Social Media. - Yi Ding, Jiandong Zang, Jun Liu:
An 8 GHz Semi-Digital DLL for CDR in High Speed SerDes Receivers. - Yujie Wu, Xiaotao Yang, Yunke Xiong:
Chemical motion target monitoring method based on LK optical flow and momentum method. - Xing Li, Jie Gao, Weimin Xu, Mengyu Li, Minyi Tan:
Multi-User Soulbound NFT for Education and Training Based on Key Escrow Model. - Lihua Wang, Zhaofeng Niu, Bowen Wang, Guangshun Li, Liangzhi Li:
Inductive Bias Integration for Transformer Enhancement in Small-scale Segmentation Tasks. - Chuanguo Shen, Zhaofeng Niu, Bowen Wang, Guangshun Li, Liangzhi Li:
WSSS-DM: Advancing Weakly Supervised Semantic Segmentation by Harnessing Diffusion Models. - Ruixue Zhang, Zhaofeng Niu, Zhouqiang Jiang, Junhao Chen, Bowen Wang, Guangshun Li, Liangzhi Li:
Validating Concept Transfer Across Different Datasets. - Ziqi Wang, Yaping Liu, Shuo Zhang, Jinrui Hu, Xinyi Liu:
A Survey of RDMA Distributed Storage. - Lei Li, Yunlong Li, Hu Tan:
DeepDecompose: A Distributed inference framework for CNN on GPU-equipped Edge Clusters. - Xin Wei, Chengguo Lv:
Syntactic and Semantic Enhanced Text Generation Model for Aspect-based Sentiment Triplet Extraction. - Lianghaojie Zhou, Yipeng Yang, Xin Li, Youquan Xian, Dongcheng Li, Peng Liu:
A Power Trading and Scheduling Scheme Based on MA-ABSE. - Andrei Nosov, Sergei Shtekhin, Alexander Lyubchenko:
Embodied Conversational Agents: Deep Learning Based Multimodal Sentiment Analysis. - Soi Hou Tam, Ka-Cheng Choi:
Indoor Item Finding based on RSSI and RFID Tags. - Na Liu, Wei-Tek Tsai:
Blockchain-based Vaccine Supervision System. - Nashwan. J. Hussein, Hasan Ameer Abdulameer, Raflaa Hilmi Al-taie:
Deep Learning and Histogram Gradient Algorithm to Detect Visual Information Based on Artificial Intelligent. - Moacir Miranda Jr., Rafael Pedrozo, Felipe Ramirez Botero, Joao Carlos Ramos, Bruno A. Bonifácio:
Interoperability for Smart Home Communication Protocols: a Case using IOT Protocols. - Temsamani Khallouk Yassine, Achchab Said:
Efficient Optimization of Neural Networks for Predictive Hiring : An In-Depth Approach to Stochastic Gradient Descent. - Haocong Li, Jie Li:
Automatically Generate Malware Detection Rules By Extracting Risk Information. - Chaolei Liang, Wei Zou, Danfeng Hu, Jiajun Wang:
Facial Action Unit Recognition Based on Self-Attention Spatiotemporal Fusion. - Xiaoyun Gan, Shanyu Gan, Taizhi Su, Peng Liu:
GANcrop: A Contrastive Defense Against Backdoor Attacks in Federated Learning. - Xiaohua Yang, Haolin Wang, Yitao Zhao, Ziwen Cai, Yijing Zhang, Yun Zhao:
An Integrity Auditing Scheme for Outsourcing Database in Power System. - Xiumei Fan, Yuchen Wang:
Trust Management Mechanism in IoV based on Bayesian classification. - Yumo Miao, Luyun Jia, Han Yu:
Firefly Algorithm Order Batching Problem Based on Local Search Optimization. - Han Yu, Luyun Jia, Yumo Miao:
CLSTM: A Dynamic Model for Predicting Winning Percentages in Tennis Matches. - Jiaqi Mao, Feng Luo, Bo Gao, Lu Wang:
A Method of Selecting Distributed Detection Stations Based on Environment. - Dr. S. Sumathi, Seeshuraj B, Samuel Joshua Raj G:
Multi-Modal Biometric Authentication with Dynamic Hosting: Enhancing Website Security using ML and AWS Cloud. - Toyonari Iwata, Shigeo Akashi, Tomofumi Matsuzawa:
An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.