Default Cover Image

2020 International Conference on Communications, Information System and Computer Engineering (CISCE)

July 3 2020 to July 5 2020

Kuala Lumpur, Malaysia

ISBN: 978-1-7281-9761-6

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-14
PrefaceFreely available from IEEE.pp. 15-15
Committee MembersFreely available from IEEE.pp. 16-16
ReviewersFreely available from IEEE.pp. 17-18
Technical features and application of electromagnetic flow meterFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Asymmetric CPW-Fed UWB Antenna with Dual-Band Rejection CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 6-13
Application of GNN in Urban ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 14-17
Comparison of Indoor localization Methods in Two-Dimensional Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 18-29
Discriminative Adversarial Domain Adaptation Based on Circle LossFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Analysis of Abnormal Measurement of Smart MeterFull-text access may be available. Sign in or learn about subscription options.pp. 34-37
Research on Modulation Recognition of OFDM Signal Based on Hierarchical Iterative Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 38-44
Study of an Application of Hybrid Spread Spectrum Technology in Satellite CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 49-54
Time-Frequency Synchronization Design of OFDM Systems Based on CAZAC SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Research on Signal Modulation Recognition Method Based on Deep Belief NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
Performance Investigation of Volterra-based Digital Predistortion Using Orthogonal Matching PursuitFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
The Impact of ICT Advances on Education: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Design and Implementation of Remote Precision Temperature Control Device for Maneuvering TargetFull-text access may be available. Sign in or learn about subscription options.pp. 74-77
Automatic Detection Method for Small Size Transmission Lines Defect Based on Improved YOLOv3Full-text access may be available. Sign in or learn about subscription options.pp. 78-81
Research on Multilevel Robust Information Decision Optimization Model of Data Communication NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 88-92
Improvement of information System Audit to Deal With Network Information SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 93-96
GPS Positioning Method of UAV Based on Improved Particle FilterFull-text access may be available. Sign in or learn about subscription options.pp. 97-101
Analysis of LoRa Transmission Distance and Data Test in Low Bit Rate Spread Spectrum CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Vertical Variation of Hg Content without Transport SourceFull-text access may be available. Sign in or learn about subscription options.pp. 113-117
Research on Repeater Technology Based on Software Defined RadioFull-text access may be available. Sign in or learn about subscription options.pp. 118-122
Prediction of Downstream BOD based on Light Gradient Boosting Machine MethodFull-text access may be available. Sign in or learn about subscription options.pp. 127-130
Comparison of Three Prediction Models for the Incidence of Epidemic DiseasesFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
A Prediction Model of Urban Rail Transit NoiseFull-text access may be available. Sign in or learn about subscription options.pp. 137-142
Graph Convolutional Networks: An Analysis of Method and Applications in Different Fields and SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 153-157
Health Management for Next-gen Blockchain: Smart Construction, Dynamic Evolution and Stochastic TransformationFull-text access may be available. Sign in or learn about subscription options.pp. 158-162
Integrated Energy Information Physical System Model and its Simulation ControlFull-text access may be available. Sign in or learn about subscription options.pp. 173-177
Intelligent Electricity Purchase and Sale Trading Platform Based on Block ChainFull-text access may be available. Sign in or learn about subscription options.pp. 183-189
Data Glove Design and Virtual Hand Simulation Based on Single-chip MicrocomputerFull-text access may be available. Sign in or learn about subscription options.pp. 190-197
Dimensionality Reduction of Massive I/O Log Data Flow in Power SystemFull-text access may be available. Sign in or learn about subscription options.pp. 198-202
A Decentralized User Authentication Model Based on Activity Proof : Use the new user identity credential: activity mapFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Multi-task BERT for problem difficulty predictionFull-text access may be available. Sign in or learn about subscription options.pp. 213-216
Research on the Cultivation Path of Craftsman Spirit in Higher Vocational StudentsFull-text access may be available. Sign in or learn about subscription options.pp. 217-220
Research on Higher Vocational Teaching Quality Improvement Based on Educational Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 227-230
Simulation for Cascading Failure in Barabási-Albert Network: a Cellular Automata ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
Online Transaction Detection Method Using Catboost ModelFull-text access may be available. Sign in or learn about subscription options.pp. 236-240
EEG-based Recognition of Fatigue Driving on HighwayFull-text access may be available. Sign in or learn about subscription options.pp. 241-244
Multi-turn Dialogue System Based on Improved Seq2Seq ModelFull-text access may be available. Sign in or learn about subscription options.pp. 245-249
BERT-IAN Model for Aspect-based Sentiment AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 250-254
Online Course Quality Evaluation Based on BERTFull-text access may be available. Sign in or learn about subscription options.pp. 255-258
Efficient Network Compression Through Smooth-Lasso ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
Semantic-based early warning system for equipment maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 264-267
Three-dimensional Reconstruction of the Semantic Terrain of Rescue Equipment WalkingFull-text access may be available. Sign in or learn about subscription options.pp. 268-274
Organization and Implementation of Mixed Online Teaching Based on Rain Classroom and Tencent ClassroomFull-text access may be available. Sign in or learn about subscription options.pp. 275-278
The Vocational Skills Competition Based on Big Data Analysis Promotes the Research of Students' Vocational AbilityFull-text access may be available. Sign in or learn about subscription options.pp. 279-282
Data Visualization and Its Implementation of Civil Service Jobs Based on PythonFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
Environment Monitoring System for Tobacco Storage Based on IOT and Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 288-291
Ontology Construction for Security Analysis of Network NodesFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Research on Automatic Test Method of Computer-Based Interlocking SystemFull-text access may be available. Sign in or learn about subscription options.pp. 298-302
A Survey on GAT-like Graph Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Learning Spread Probability Based on User’s Influence and FlavourFull-text access may be available. Sign in or learn about subscription options.pp. 309-313
Design of Postoperative Visual Acuity Prediction Program Based on Machine Learning before Cataract SurgeryFull-text access may be available. Sign in or learn about subscription options.pp. 314-316
An Encryption and Decryption Algorithm Based on Random Dynamic Hash and Bits ScramblingFull-text access may be available. Sign in or learn about subscription options.pp. 317-320
Support Vector Machine Based Diagnosis of Breast CancerFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
Behavior detection method of OpenPose combined with Yolo networkFull-text access may be available. Sign in or learn about subscription options.pp. 326-330
Effective Factors Analysis on Camera CalibrationFull-text access may be available. Sign in or learn about subscription options.pp. 331-334
Design and Implementation of Tibetan-Chinese Dictionary System based on iOSFull-text access may be available. Sign in or learn about subscription options.pp. 335-338
Uniform Sound Field Reconstruction Algorithm Based on Total Least Squares in Non-Free FieldFull-text access may be available. Sign in or learn about subscription options.pp. 339-342
Safety Helmet Wearing Detection Based on Image Processing and Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 343-347
An Integrated Energy System Optimization Method Considering Q Learning AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
A Path Planning Algorithm of Spray Robot based on 3D Point CloudFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
Research on Cybersecurity Risk Assessment in SCADA Networks Based on AHP-RSRFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
Simulation analysis of wire rope drawing based on AbaqusFull-text access may be available. Sign in or learn about subscription options.pp. 365-367
Attendance System Based on Dynamic Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
Automatic Identification and Defect Diagnosis of Transmission Line Insulators Based on YOLOv3 NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
Research on service path configuration method based on shamir algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
Research Status and Prospects of Deep Learning in Medical ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 380-382
Real-time Online Transmission System for Slope Runoff and Sediment ContentFull-text access may be available. Sign in or learn about subscription options.pp. 383-386
Simulation Research on Pipeline Map System Based on Multi-robot Queue CooperationFull-text access may be available. Sign in or learn about subscription options.pp. 387-390
Design of Network Information Service Platform for Intelligent Agricultural Industry ChainFull-text access may be available. Sign in or learn about subscription options.pp. 391-394
Design of bar code automatic identification system based on mobile terminalFull-text access may be available. Sign in or learn about subscription options.pp. 395-397
Mutual Transformation between Vertical Sediment Amount and Vertical Diluted AmountFull-text access may be available. Sign in or learn about subscription options.pp. 398-402
Research on Sparse Channel Estimation Algorithm Based on MIMO-OFDM SystemFull-text access may be available. Sign in or learn about subscription options.pp. 403-406
Study on Die Casting Speed Control based on Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 407-410
Research on Rape Image Automatic Segmentation Method Based on RGB Color SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 411-415
Single Side-band Modulation Algorithm Of Aarametric Array Based On Iterative Hilbert TransformFull-text access may be available. Sign in or learn about subscription options.pp. 416-420
An Automatic Column Welding Test Device Controlled by an Industrial Computer and PLCFull-text access may be available. Sign in or learn about subscription options.pp. 421-424
Intelligent Commodity Settlement System based on Embedded Equipment and Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 425-428
O2O Integrated AI Precise Poverty Alleviation PlanFull-text access may be available. Sign in or learn about subscription options.pp. 429-432
Data Association Rules Mining Method Based on RBF Neural Network Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 433-436
Design of convolutional neural network SoC system based on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 437-439
Invoice Code Recognition System Based on FPGA AccelerationFull-text access may be available. Sign in or learn about subscription options.pp. 440-444
Vehicle Brand Classification Method Based on PCA-NET Under Complex BackgroundFull-text access may be available. Sign in or learn about subscription options.pp. 445-449
Showing 100 out of 107