Default Cover Image

2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)

Nov. 11 2022 to Nov. 13 2022

Beijing, China

ISBN: 978-1-6654-5488-9

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-13
Message from General ChairFreely available from IEEE.pp. 14-14
Message from Program ChairFreely available from IEEE.pp. 15-15
Organizing CommitteeFreely available from IEEE.pp. 16-16
Program CommitteeFreely available from IEEE.pp. 17-17
Steering CommitteeFreely available from IEEE.pp. 18-18
SponsorsFreely available from IEEE.pp. 19-19
ReviewersFreely available from IEEE.pp. 20-22
An Improved Method for Making CNN Immune to Backdoor Attack by Activating ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Internet of Things Terminal Access Security Based on Zero TrustFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Research on Multiple Classification Detection for Network Traffic Anomaly Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 12-16
Research on Security Risk Detection System of Intelligent Internet of Things TerminalFull-text access may be available. Sign in or learn about subscription options.pp. 17-20
Summary Model based on Semantic Similarity Attention FocusFull-text access may be available. Sign in or learn about subscription options.pp. 21-24
The Design and Implementation of Software Defined Network Security Service Choreography SystemFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
A Study on Multi-pose Face Recognition Based on Improved Local Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
An Analysis of Current Continual Learning Algorithms in an Image Classification ContextFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
An Intrusion Detection Approach Based on Improved Deep Belief Network and LightGBMFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Application of prototypical networks in microbiome-based disease predictionFull-text access may be available. Sign in or learn about subscription options.pp. 45-49
Identity Identification of Power Intelligent Terminals Based on Behavior ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 50-54
Optimal Order Acceptance and Scheduling via Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Research on Green Driving Algorithm of Electric Power Enterprises based on Driving BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Research on Power Fault Data Fusion and Diagnosis Model Based on Improved BP Network AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 73-77
Students' classroom Emotion Analysis Based on Intelligent RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 78-82
Connected Multi-speech Task for Detecting Alzheimer’s Disease Using a Two-Layer ModelFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Convolution neural network with multiple pooling strategies for speech emotion recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 89-92
FAQ question Answering method based on semantic similarity matchingFull-text access may be available. Sign in or learn about subscription options.pp. 93-100
Quality assessment of cross-topic article features based on improved CTS modelFull-text access may be available. Sign in or learn about subscription options.pp. 101-106
Construction of Early Warning Model of Geological Disasters Based on Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 107-111
Evaluation of University Teaching Quality Based on Hadoop and Deep MiningFull-text access may be available. Sign in or learn about subscription options.pp. 118-122
Research on personalized resource recommendation algorithm for parent educationFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Research on Tourism Resources Management Method Based on Deep Learning and Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 127-131
UNEG: A Description-Enhanced Graph-based News Recommendation MethodFull-text access may be available. Sign in or learn about subscription options.pp. 132-136
Construction of rail wear and crack initiation prediction model combined with BP neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Design and Application of Medical Guidance Information System Based on Factor Cluster AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 142-147
Fatigue Driving Detection Method Based on Multiple FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 148-152
MLFT-Net: Point Cloud Completion Using Multi-Level Feature TransformerFull-text access may be available. Sign in or learn about subscription options.pp. 159-165
Multi-condition Fault Diagnosis of Internal Combustion Engine Based on Convolutional NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 166-170
Real-time Estimation of AOS based on Constant Wind Field AssumptionFull-text access may be available. Sign in or learn about subscription options.pp. 171-174
Research on Education Cost Prediction Based on Improved BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 175-179
State-of-Health Prediction of lithium-Ion Battery Based on Transfer LearningFull-text access may be available. Sign in or learn about subscription options.pp. 185-189
Study on flight test of Terrain awareness and warning systemFull-text access may be available. Sign in or learn about subscription options.pp. 190-194
A Real time Decision Making Method of Electronic Warfare Based on the Protection of Key PointsFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
A Real-Time Vehicle Indoor Positioning Algorithm Based on Multi-Camera PerceptionFull-text access may be available. Sign in or learn about subscription options.pp. 200-204
Accurate Trajectory Extraction of Dynamic Targets for Driving Behaviour AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 205-210
Data Access Control Method of Power Terminal Based on Trust and ReputationFull-text access may be available. Sign in or learn about subscription options.pp. 211-215
Platoon longitudinal and lateral control and cooperative positioning algorithm based on DMPC and FedKFFull-text access may be available. Sign in or learn about subscription options.pp. 216-220
Research on Robot Intelligent Control Method Based on Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 221-225
An Improved Genetic Algorithm for Generation of Pairwise Combination Test CasesFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Efficient Traffic Scheduling Using Genetic Algorithm in Time-Sensitive NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 232-238
Fault Monitoring of Flexible Switching Distribution Network on Account of Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 239-243
MFSCD* Lite: A situation-based path planning algorithm for agent in wargameFull-text access may be available. Sign in or learn about subscription options.pp. 244-249
Optimization of Material Distribution Route Based on Green Logistics and Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 250-254
Research on Delivery Mode of Fresh E-commerce Under Uncertain Delivery-pickup TimeFull-text access may be available. Sign in or learn about subscription options.pp. 255-260
Solving VRPTW Problem Based on Improved Drosophila Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 261-264
Combined Image Enhancement for Recyclable Waste Object Detection In Low-Light EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 265-269
Construction of a hybrid education system based on global optimization algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 270-274
HDR image identification network based on edge differenceFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
Research on Financial Risk Prediction Method of Listed Companies Based on GA-RBF Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 281-285
Research on Recognition Algorithm of Industrial Instrument Based on Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 286-290
Research on safety detection of power terminal based on neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 291-295
Research on Time-Anchored Law Enforcement Video Correlation TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Security protection strategy of power terminal based on deep learningFull-text access may be available. Sign in or learn about subscription options.pp. 301-305
Synergistic Effect Research of K-modes Algorithm in the Evaluation of Physical Education TeachingFull-text access may be available. Sign in or learn about subscription options.pp. 306-310
Temperature Recognition of Infrared Temperature Map Based on Improved BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 311-315
A Real-Time Comparative Analysis Method of Lift Coefficient for Artificial Ice Flight TestFull-text access may be available. Sign in or learn about subscription options.pp. 316-318
An Adaptive GViT for Gas Mixture Identification and Concentration EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 319-323
Development planning of complex equipment based on cumulative prospect theoryFull-text access may be available. Sign in or learn about subscription options.pp. 324-330
Establishment of Shipping Container Price Prediction Model for International TradeFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
An evaluation system of informatization level in Jinan suburban counties under the background of smart city constructionFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
GAME-BC: A Graph Attention Model for Exploring Bitcoin CrimeFull-text access may be available. Sign in or learn about subscription options.pp. 342-346
Research on Security Service Model of Software Defined NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 347-351
Transmission Line Modeling Based on 3D Laser Scanning Point CloudFull-text access may be available. Sign in or learn about subscription options.pp. 352-356
Benchmark Research on Computing Performance of Domestic General-purpose ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
Big Data Storage Index Mechanism Based on Hierarchical Indexing and Concurrent UpdatingFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Design of A Programmable PCI-E Encryption System Based on RISC-VFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Research on the Construction and Usage of University History Image Data Database Based on Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 374-378
Author IndexFreely available from IEEE.pp. 381-383
Showing 84 out of 84