Default Cover Image

2021 3rd International Conference on Applied Machine Learning (ICAML)

July 23 2021 to July 25 2021

Changsha, China

ISBN: 978-1-6654-2125-6

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xvi
PrefaceFreely available from IEEE.pp. xvii-xviii
Organizing CommitteeFreely available from IEEE.pp. xix-xxii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xxiii-xxv
A Bayesian Network Learning Method with Easy ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Quantitative Analysis of Fault Diagnosis Based on Fault Tree ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 7-10
Coupling Coordinated Analysis of Environmental Regulation and Industrial Structure in Heilongjiang ProvinceFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Gene Feature Selection Method Based on ReliefF and Pearson CorrelationFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Comic Text Detection and Recognition Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Phishing Webpage Classification Method based on Joint FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 24-27
Automatic Poincare SectionFull-text access may be available. Sign in or learn about subscription options.pp. 28-31
Animation Character Action Feature Extraction Based on Pyramid LK Optical Flow AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 32-36
The Dual Model of Support Vector Machine Based on Granular Ball ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Detecting and Classifying Phishing Websites by Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
An Intrusion Detection Method based on PCA and ResNetFull-text access may be available. Sign in or learn about subscription options.pp. 52-56
Time Series Search Based on Locality Sensitive HashingFull-text access may be available. Sign in or learn about subscription options.pp. 57-61
Static Analytical Reasoning of Directed Cyclic Graph in the Discrete Case Weight Combination MethodFull-text access may be available. Sign in or learn about subscription options.pp. 62-66
COVID-19 CT Image Classification and Pneumonia Lesions Segmentation Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 67-71
SART Based on Relativity-of-Gaussian Toward Low-Dose CT ReconstructionFull-text access may be available. Sign in or learn about subscription options.pp. 72-75
Low Resolution Face Recognition System Based on ESRGANFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
Multiscale Hierarchical Attention Fusion Network for Edge DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Research on Recognition Method of Circuit Fault Diagnosis Model Based on Neural Network Fuzzy ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 91-94
Using Deep Learning and Image Recognition to Realize The Electronic Management of Paper Original RecordsFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
Optimization for Logic Operation Problem in Stochastic Simulation of Dynamic Causality Uncertain GraphFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
Incomplete Relationship in Sampling Inference Algorithm of Dynamic Uncertain Causality GraphFull-text access may be available. Sign in or learn about subscription options.pp. 105-110
Are There Spillover Effects of Monetary Policy Uncertainty Among Developing Economies? - Evidence from China and IndiaFull-text access may be available. Sign in or learn about subscription options.pp. 115-119
Software and Hardware Integrated Accelerators for Hadoop ApplianceFull-text access may be available. Sign in or learn about subscription options.pp. 123-127
Qualitative Analysis of Fault Tree Diagnosis for TCAS Data ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 128-131
Design and Implementation of Course Selection System based on SpringCloud Micro-service ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 132-135
Study on the Comprehensive Evaluation System of Pingxiang Cultural CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 140-143
An Empirical Analysis of the Influencing Factors of Chinese College Students' Credit Card ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Internet of Things Gateway FabricationFull-text access may be available. Sign in or learn about subscription options.pp. 157-160
The Countermeasures of Big Data and Its Intelligent Processing in the Internet of Things IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 161-164
The Impact of the Development of the Internet of Things on the Robotics Engineering ProfessionFull-text access may be available. Sign in or learn about subscription options.pp. 165-168
The Principle of Firewall Technology and Its Application in Computer Network SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 174-177
An Experimental Study on the Disyllabic Tones of Lhasa DialectFull-text access may be available. Sign in or learn about subscription options.pp. 178-181
Research on Tone Perception of Tibetan Native Speakers in Mandarin Based on Acoustic FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 186-190
Word Embedding-based Context-sensitive Network Flow Payload Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 191-194
A Phishing Detection Method Based on Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 202-205
Reconfigurable Aggregation Tree for Distributed Machine Learning in Optical WANFull-text access may be available. Sign in or learn about subscription options.pp. 206-210
Design of Hybrid Wireless Network on Chip and Maximum Three Hops Routing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
The Prediction of Apple Inc. Stock Price with Machine Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
An Experimental Study on Mandarin Tones of Dongxiang Male College Students in Gansu ProvinceFull-text access may be available. Sign in or learn about subscription options.pp. 226-230
Gymnasium Simulation Design and Implementation Based on 3D Virtual BuildingFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
File Text Recognition and Management System Based on Tesseract-OCRFull-text access may be available. Sign in or learn about subscription options.pp. 236-239
Application of Artificial Intelligence in Customer Service FieldFull-text access may be available. Sign in or learn about subscription options.pp. 240-244
Reliability Analysis of Different Fault-Tolerant Mechanisms in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 250-256
Sentence Segmentation in Chinese Standard Vehicles Verification Note Texts Based on Context RulesFull-text access may be available. Sign in or learn about subscription options.pp. 257-261
Big Data Guided Vehicle Routing with Urgence ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 262-266
Similarity Computing Method of Poly-Encoders Short Texts in Both Chinese and Lao Based on Part of Speech CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 267-271
Research on A Fuzzy Clustering Partition Analysis Method for Circuit Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 272-275
New Word Discovery Algorithm for NewsFull-text access may be available. Sign in or learn about subscription options.pp. 276-279
Research on Data Standard Compliance Testing of Transportation Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 280-284
Design of An Intelligent Transfer Robot with Color RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Research on Learning Method of Attribute Network Representation for Edge Node DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Research on Vehicle Safety in Accordance with EU RegulationsFull-text access may be available. Sign in or learn about subscription options.pp. 298-301
Research on the Evaluation Technology of Automobile After-sales Service Based on Fuzzy Comprehensive EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 302-305
Multi-moving Target Recognition and Tracking Based on Mobile Robot PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 306-309
Research on the Failure Mode of Safety Related Parts of Passenger CarsFull-text access may be available. Sign in or learn about subscription options.pp. 310-314
Research and Implementation of Image Recognition FOR Certificate Sortingand Stamping RobotFull-text access may be available. Sign in or learn about subscription options.pp. 315-318
A Driving Early Warning Method Based on Multi-Factor FusionFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
Comparative Study of the HGA Test Process and the SDPT Process in the Mass Production of the Hard Disk DriveFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
How to Apply Artificial Intelligence in the Event of Equipment FailureFull-text access may be available. Sign in or learn about subscription options.pp. 331-334
Comprehensive Evaluation of Pingxiang Sponge City ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 335-338
Grey Correlation Analysis of Producer Service and Manufacturing in Heilongjiang ProvinceFull-text access may be available. Sign in or learn about subscription options.pp. 339-342
Causes of Errors in Machining Process Technology and Control StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 343-346
Research on the Suspension Force Model for the Large-Air-Gap Permanent-Magnet Suspension Belt ConveyorFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Research on Dam Deformation Prediction Model Based on Wavelet Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
A Predictive Current Control for Aerospace Servo MotorFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Research on Lean Improvement of Liquid Cooling Product LineFull-text access may be available. Sign in or learn about subscription options.pp. 370-374
Convolutional Neural Network Based Smart System to aid an Epileptic PatientFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
A Deep Learning Method on Audio and Text Sequences for Automatic Depression DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 388-392
Emotional Analysis of Clothing Product Reviews Based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 398-401
A Wireless and Wearable System for Fetal Heart Rate MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
Deep Learning Based Diagnosis of Alzheimer's Disease Using Structural Magnetic Resonance Imaging: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 408-412
A Survey on Neural Machine Translation Applied to Sign Language GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Predicting SOC of Power Battery Based on GA-BP AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 431-434
In-network Caching in Mobile Network: Research Issues and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 435-440
Single Stage Inverted Pendulum Controller DesignFull-text access may be available. Sign in or learn about subscription options.pp. 441-444
Application of PWM Control Technology in Photovoltaic Inverter CircuitFull-text access may be available. Sign in or learn about subscription options.pp. 445-448
Navigation Safety Monitoring System of Ship Bridge Area Based on Convolution Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 449-452
Showing 100 out of 113