Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CISCE
CISCE 2020
Generate Citations
2020 International Conference on Communications, Information System and Computer Engineering (CISCE)
July 3 2020 to July 5 2020
Kuala Lumpur, Malaysia
ISBN: 978-1-7281-9761-6
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-14
Preface
Freely available from IEEE.
pp. 15-15
Committee Members
Freely available from IEEE.
pp. 16-16
Reviewers
Freely available from IEEE.
pp. 17-18
Technical features and application of electromagnetic flow meter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Baoyang Chen
,
Yong Zhou
,
Tongquan Huang
,
Songdong Ying
,
Tongcai Chen
Asymmetric CPW-Fed UWB Antenna with Dual-Band Rejection Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-13
by
Qing-li Zeng
,
Lei Ding
,
Shan-rong Chen
Application of GNN in Urban Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-17
by
Xuanguang Chen
Comparison of Indoor localization Methods in Two-Dimensional Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-29
by
Bixing Yan
,
Bin Zhu
,
Huihe Chen
,
Yueqi Yang
,
Jianqiao Yang
Discriminative Adversarial Domain Adaptation Based on Circle Loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-33
by
Peng Zhao
,
Biao Zhou
Analysis of Abnormal Measurement of Smart Meter
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-37
by
Dong Xianguang
,
Dai Yanjie
,
Chen Zhiru
,
Liu Xiao
,
Liu Yanxi
,
Wang Tingting
,
Zhengxue
,
Yang Jie
,
Xu Ziqian
Research on Modulation Recognition of OFDM Signal Based on Hierarchical Iterative Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-44
by
Liu Gaohui
,
Cao Jiakun
Design and Development of Inspection Management Information System for Power Plant Boiler Based on J2EE
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-48
by
Chen WANG
,
Pengbo LIU
,
Shuangchang FENG
,
Xiaochang LIU
Study of an Application of Hybrid Spread Spectrum Technology in Satellite Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-54
by
Ge Zheng
,
Yiping Yao
,
Dongdong Wang
,
Jinchao Tian
Time-Frequency Synchronization Design of OFDM Systems Based on CAZAC Sequence
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-58
by
Xinge Fan
,
Jian Yang
,
Wenjing Zhang
Research on Signal Modulation Recognition Method Based on Deep Belief Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Zhiwei Li
,
Shuo Yang
,
Xincheng An
,
Zhuoyue Li
,
Xiyu Sun
,
Rui Zhu
,
Wenguang Lin
Performance Investigation of Volterra-based Digital Predistortion Using Orthogonal Matching Pursuit
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Xi Liu
,
Pu Miao
The Impact of ICT Advances on Education: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Chao Duan
,
Dongpo Guo
,
Jerry Xie
,
Jing Zhang
Design and Implementation of Remote Precision Temperature Control Device for Maneuvering Target
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-77
by
Luo Jun
,
Ding Han
,
Lu Wenjun
Automatic Detection Method for Small Size Transmission Lines Defect Based on Improved YOLOv3
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-81
by
Lv Shouguo
,
Liu Kai
,
Qiao Yaohua
,
Li Yunqi
,
Sun Yang
,
Li Zhenyu
Autofocus System for Imaging Multiple Cells Across Thick Liquid Layers in Differrent Focal Planes
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-87
by
Lin Liu
,
Xiaohui Du
,
Juanxiu Liu
,
Guangming Ni
,
Jing Zhang
,
Ruqian Hao
,
Xiangzhou Wang
,
Yong Liu
,
Hongliang Ren
Research on Multilevel Robust Information Decision Optimization Model of Data Communication Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-92
by
Ding Han
,
Luo Jun
,
Yang Jin
,
Lu Wenjun
Improvement of information System Audit to Deal With Network Information Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-96
by
Xinyu Zhou
GPS Positioning Method of UAV Based on Improved Particle Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-101
by
Qing Xin
,
Shixun Wang
Research on Maritime Rescue UAV Based on Beidou CNSS and Extended Square Search Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-106
by
Jiankai Zuo
,
Jiatong Chen
,
Zhengsheng Li
,
Zhongzhi Li
,
Zeyuan Liu
,
Zhixuan Han
Analysis of LoRa Transmission Distance and Data Test in Low Bit Rate Spread Spectrum Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Wang Li-ming
,
Yan Xiao-ling
,
Yin Yang
,
Han Li-chun
Vertical Variation of Hg Content without Transport Source
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-117
by
Dongfang Yang
,
Haixia Li
,
Qi Wang
,
Danfeng Yang
,
Weifeng Ling
Research on Repeater Technology Based on Software Defined Radio
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-122
by
Kuan Zhou
,
Ling Deng
,
Jun Zhang
Classifying Quality Grading and Size of Allium Cepa Using Digital Image Processing Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-126
by
Bhai Nhuraisha I. Deplomo
,
Jennifer C. Dela Cruz
,
Jessie R. Balbin
Prediction of Downstream BOD based on Light Gradient Boosting Machine Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-130
by
Yuelai Su
,
Yining Zhao
Comparison of Three Prediction Models for the Incidence of Epidemic Diseases
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-136
by
Yining Zhao
,
Yuelai Su
A Prediction Model of Urban Rail Transit Noise
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-142
by
Juxuan Lyu
Evaluating the Effectiveness of COVID-19 Prevention and Control Measures Based on SEIR Model
Freely available from IEEE.
pp. 143-146
by
Yuanhao Wang
Analysis of Blocking Population Flow to Control COVID-19 in Multi-regions Based on Discrete SEIR Epidemic Model
Freely available from IEEE.
pp. 147-152
by
Shengce Zhang
Graph Convolutional Networks: An Analysis of Method and Applications in Different Fields and Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-157
by
Hongrui Peng
Health Management for Next-gen Blockchain: Smart Construction, Dynamic Evolution and Stochastic Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-162
by
Li Kuan
,
Du Chenglie
,
Li Zhenguo
,
Wang Yi
IoT System for Collecting Vital Signs and Geographic Location Data of Mobile Users
Freely available from IEEE.
pp. 163-168
by
Yifan Yang
,
Yujie Wang
,
Yangkai Lin
,
Liye Jia
Design and Implementation of Multi-tenant Vehicle Monitoring Architecture Based on Microservices and Spark Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
Chen Chen
,
Jianjun Cai
,
Nver Ren
,
Xu Cheng
Integrated Energy Information Physical System Model and its Simulation Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-177
by
Kunpeng Zhao
,
Yongli Wang
,
Jiantao Kou
,
Daomin Qu
,
Jie Bai
,
Huanran Dong
,
Minhan Zhou
Research on Comprehensive Budget Management of Clothing E-commerce Enterprises Under the Background of Big Data: Take H Group as an Example
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-182
by
Liya Zhu
,
Jiaxin Feng
,
Xiaoyang Sun
,
Pengcheng Xue
,
Qingchuan Meng
Intelligent Electricity Purchase and Sale Trading Platform Based on Block Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-189
by
XiaoRong Duan
Data Glove Design and Virtual Hand Simulation Based on Single-chip Microcomputer
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-197
by
Ji Yun Shi
,
Tong Wu
,
Wen Zhe Yan
,
Lin Nan Wang
Dimensionality Reduction of Massive I/O Log Data Flow in Power System
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-202
by
Bo Zhang
,
Zesheng Xi
,
Tao Zhang
,
Yuanyuan Ma
,
Zhipeng Shao
,
Hongfa Li
Multi-energy Flow Regulation and Operation Method of Distribution Network Based on Smart City Energy Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-206
by
Cuizhe Kuang
,
Qun Wang
,
Jianhua Wan
,
Guoxin Li
,
Baoqiang Lv
A Decentralized User Authentication Model Based on Activity Proof : Use the new user identity credential: activity map
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
Wu Jing
Multi-task BERT for problem difficulty prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-216
by
Ya Zhou
,
Can Tao
Research on the Cultivation Path of Craftsman Spirit in Higher Vocational Students
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-220
by
Yongliang Li
Research on the Influence of E-commerce Non-subjective Fault Behavior on Consumers’ Repurchase Intention
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-226
by
Xin Liu
,
Hui Xu
,
Pengcheng Xue
,
Xiaohan Liu
,
Zhuochun Xu
Research on Higher Vocational Teaching Quality Improvement Based on Educational Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-230
by
Ya Wang
,
Yanmei Yang
Simulation for Cascading Failure in Barabási-Albert Network: a Cellular Automata Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Jun Zhang
,
Xinli Xiong
,
Yongjie Wang
,
Jingye Zhang
Online Transaction Detection Method Using Catboost Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-240
by
Yunlong Li
,
Yingan Mai
,
Zijian Lin
,
Shufen Liang
EEG-based Recognition of Fatigue Driving on Highway
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-244
by
Xu Luo
,
Hong Wang
Multi-turn Dialogue System Based on Improved Seq2Seq Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-249
by
Zhonghe Han
,
Zequn Zhang
BERT-IAN Model for Aspect-based Sentiment Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-254
by
Huibing Zhang
,
Fang Pan
,
Junchao Dong
,
Ya Zhou
Online Course Quality Evaluation Based on BERT
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-258
by
Ya Zhou
,
Meng Li
Efficient Network Compression Through Smooth-Lasso Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Xiaowei Ye
,
Ning Xu
,
Xiaofeng Liu
,
Xiao Yao
,
Aiming Jiang
Semantic-based early warning system for equipment maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-267
by
Daoqu Geng
,
Qilin Liu
Three-dimensional Reconstruction of the Semantic Terrain of Rescue Equipment Walking
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-274
by
Peng Zhang
,
Yi Xiao
,
Xinqing Wang
,
Honghui Xu
Organization and Implementation of Mixed Online Teaching Based on Rain Classroom and Tencent Classroom
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-278
by
Shijin Li
,
Fucai Wang
,
Yijia Gao
,
Ting SHI
The Vocational Skills Competition Based on Big Data Analysis Promotes the Research of Students' Vocational Ability
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-282
by
Qiliang Hu
Data Visualization and Its Implementation of Civil Service Jobs Based on Python
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-287
by
Dawei Xiang
,
Danli Lei
,
Yanbo Wu
Environment Monitoring System for Tobacco Storage Based on IOT and Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-291
by
Dagui Chen
,
Donghai Liu
Ontology Construction for Security Analysis of Network Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Kai Zhang
,
Jingju Liu
Research on Automatic Test Method of Computer-Based Interlocking System
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-302
by
Jinlong Qian
,
Wei Guo
,
Hongtao Zhang
,
Xiaona Li
A Survey on GAT-like Graph Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Sikun Guo
Learning Spread Probability Based on User’s Influence and Flavour
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-313
by
Chen Zhaorui
,
Wang Xiaomeng
Design of Postoperative Visual Acuity Prediction Program Based on Machine Learning before Cataract Surgery
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-316
by
Liu Shuxian
An Encryption and Decryption Algorithm Based on Random Dynamic Hash and Bits Scrambling
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-320
by
Guanghui Feng
,
Chunfu Zhang
,
Yujuan Si
,
Liuqi Lang
Support Vector Machine Based Diagnosis of Breast Cancer
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-325
by
Mingqi Chen
,
Yinshan Jia
Behavior detection method of OpenPose combined with Yolo network
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-330
by
Wei Lina
,
Jiangtao Ding
Effective Factors Analysis on Camera Calibration
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-334
by
Wang Zhen-wei
,
Shi Hong-sheng
,
Lin Dan-lan
Design and Implementation of Tibetan-Chinese Dictionary System based on iOS
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-338
by
Hui Cao
,
Qian Li
Uniform Sound Field Reconstruction Algorithm Based on Total Least Squares in Non-Free Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-342
by
Dengqiang Li
,
Hongliang Zhang
Safety Helmet Wearing Detection Based on Image Processing and Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-347
by
Wei Zhang
,
Chi-fu Yang
,
Feng Jiang
,
Xian-zhong Gao
,
Xiao Zhang
An Integrated Energy System Optimization Method Considering Q Learning Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-352
by
Yongli Wang
,
Shuquan Li
,
Daomin Qu
,
Shaokun Jia
,
Xincan Gan
,
Yuze Ma
,
Yaling Sun
A Path Planning Algorithm of Spray Robot based on 3D Point Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-360
by
Jubo Yang
,
Minxiu Kong
,
Rundong Wang
Research on Cybersecurity Risk Assessment in SCADA Networks Based on AHP-RSR
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-364
by
Jing Lan
Simulation analysis of wire rope drawing based on Abaqus
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-367
by
Meili Dai
Attendance System Based on Dynamic Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-371
by
Shizhen Huang
,
Haonan Luo
Automatic Identification and Defect Diagnosis of Transmission Line Insulators Based on YOLOv3 Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
by
Yangyang Bao
,
Tian Chen
Research on service path configuration method based on shamir algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
by
Gao Ming
,
Ying Lili
Research Status and Prospects of Deep Learning in Medical Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-382
by
Chao Liang
,
Shaojie Xin
Real-time Online Transmission System for Slope Runoff and Sediment Content
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-386
by
ZHANG Shao-jie
,
ZHANG Kuang-wei
Simulation Research on Pipeline Map System Based on Multi-robot Queue Cooperation
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-390
by
ZHANG Kuang-wei
,
ZHANG Shao-jie
,
CHEN Yan
,
PAN Hong
,
ZHANG Chen-guang
Design of Network Information Service Platform for Intelligent Agricultural Industry Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-394
by
Kai Shi
Design of bar code automatic identification system based on mobile terminal
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-397
by
Luo Jing
Mutual Transformation between Vertical Sediment Amount and Vertical Diluted Amount
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-402
by
Dongfang Yang
,
Danfeng Yang
,
Dong Yang
,
Dongmei Jing
,
Haixia Li
Research on Sparse Channel Estimation Algorithm Based on MIMO-OFDM System
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-406
by
Wei Xu
,
Zhe Zhao
Study on Die Casting Speed Control based on Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-410
by
Zhengsi Wu
,
Yifeng Wu
,
Enlai Zhang
Research on Rape Image Automatic Segmentation Method Based on RGB Color Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-415
by
Li-xin TAN
,
Yu-tian LI
Single Side-band Modulation Algorithm Of Aarametric Array Based On Iterative Hilbert Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-420
by
Dekai Sun
,
Hongliang Zhao
An Automatic Column Welding Test Device Controlled by an Industrial Computer and PLC
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-424
by
Zhehao Ding
,
Tian Chen
,
Qihang Zhang
Intelligent Commodity Settlement System based on Embedded Equipment and Convolutional Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-428
by
Fushan Li
,
Lan Luo
O2O Integrated AI Precise Poverty Alleviation Plan
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-432
by
Shih-Feng Chang
,
Hui Ding
,
Min-Qi Huang
,
Yong-Lin Tan
,
Jun-Jie Chen
,
Zhi-Tao Huang
Data Association Rules Mining Method Based on RBF Neural Network Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-436
by
Tianyu Xia
,
Zhanghao Ye
,
Haoning Wu
,
Yiding Liu
Design of convolutional neural network SoC system based on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-439
by
Wei Lin
,
Lei Zhang
Invoice Code Recognition System Based on FPGA Acceleration
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-444
by
Shizhen Huang
,
HongHuang Huang
,
Guowei Huang
Vehicle Brand Classification Method Based on PCA-NET Under Complex Background
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-449
by
Jianqiu Chen
Showing 100 out of 107
Load More
Load All