Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICAML
ICAML 2021
Generate Citations
2021 3rd International Conference on Applied Machine Learning (ICAML)
July 23 2021 to July 25 2021
Changsha, China
ISBN: 978-1-6654-2125-6
Table of Contents
Proceedings 2021 3rd International Conference on Applied Machine Learning [Title page i]
Freely available from IEEE.
pp. 1-1
Proceedings 2021 3rd International Conference on Applied Machine Learning [Title page iii]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xvi
Preface
Freely available from IEEE.
pp. xvii-xviii
Organizing Committee
Freely available from IEEE.
pp. xix-xxii
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xxiii-xxv
A Bayesian Network Learning Method with Easy Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Zhenxu Wu
,
Zhanpeng Yu
,
Fangchengyang Hou
,
Qingqing Sun
Quantitative Analysis of Fault Diagnosis Based on Fault Tree Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-10
by
Xiaomin Xie
,
Yueqin Wang
,
Kun Hu
,
Jianghuai Du
Coupling Coordinated Analysis of Environmental Regulation and Industrial Structure in Heilongjiang Province
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-14
by
Dapeng Dong
Gene Feature Selection Method Based on ReliefF and Pearson Correlation
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Zhang Yaping
,
Zhou Changyin
Comic Text Detection and Recognition Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-23
by
Hong Xin
,
Chi Ma
,
De Li
Phishing Webpage Classification Method based on Joint Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-27
by
Ercheng Liu
Automatic Poincare Section
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-31
by
Jie Cheng
,
Ruike Wang
,
Wenshi Li
Animation Character Action Feature Extraction Based on Pyramid LK Optical Flow Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-36
by
Junjie Nan
,
Lingyu Wang
,
De Li
Research on Hardware Implementation Technology of Dark Channel Priori Dehazing Algorithm Based on PYNQ
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Yinghao Yang
,
Yongbo Zhu
,
Quansheng Yang
,
Zhongming Jiang
The Dual Model of Support Vector Machine Based on Granular Ball Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-47
by
Yanfei Xue
,
Yabin Shao
,
Shuyin Xia
,
Guoyin Wang
Detecting and Classifying Phishing Websites by Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Zichen Fan
An Intrusion Detection Method based on PCA and ResNet
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-56
by
Zhonghan Xu
,
Ming Liu
Time Series Search Based on Locality Sensitive Hashing
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-61
by
Mengru Zhang
Static Analytical Reasoning of Directed Cyclic Graph in the Discrete Case Weight Combination Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-66
by
Kun Qiu
,
Qin Zhang
COVID-19 CT Image Classification and Pneumonia Lesions Segmentation Using Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-71
by
Jian Huang
,
Dongling Liang
SART Based on Relativity-of-Gaussian Toward Low-Dose CT Reconstruction
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-75
by
Hui Peng
,
Weikun Sun
,
Shidi Yang
,
Dongjiang Ji
Low Resolution Face Recognition System Based on ESRGAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-79
by
Chengkun Song
,
Zhujiang He
,
Yinghuai Yu
,
Zhenni Zhang
Multiscale Hierarchical Attention Fusion Network for Edge Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Kun Meng
,
Xianyong Dong
,
Shuyin Xia
,
Zizhong Chen
,
Hongyuan Shan
Fault Diagnosis of Rolling Bearing Based on Fast Spectral Kurtosis and PSO Optimized Multi Kernel Extreme Learning Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-90
by
Jinzhuo Liu
,
Jianfeng Qu
,
Guojian Luo
,
Yi Zhang
Research on Recognition Method of Circuit Fault Diagnosis Model Based on Neural Network Fuzzy Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-94
by
Xiaomin Xie
,
Yong Zeng
,
Kun Hu
,
Jianghuai Du
Using Deep Learning and Image Recognition to Realize The Electronic Management of Paper Original Records
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
Yujun Shan
,
Fengwei Wang
,
Chunting Wang
Optimization for Logic Operation Problem in Stochastic Simulation of Dynamic Causality Uncertain Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Hao Nie
,
Qin Zhang
Incomplete Relationship in Sampling Inference Algorithm of Dynamic Uncertain Causality Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
Hao Nie
,
Qin Zhang
Financial Ability Analysis for Enterprises' Competitive Advantage Study Based on Qualitative and Quantitative Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-114
by
Cheng Yueming
,
Chen Ziyu
,
Cheng Yi
,
Tan Xiaoying
,
Chen Bing
Are There Spillover Effects of Monetary Policy Uncertainty Among Developing Economies? - Evidence from China and India
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-119
by
Yingce Yang
Software and Hardware Integrated Accelerators for Hadoop Appliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-127
by
Yuan Meng
,
Jun Yang
,
Jun Li
,
Shengkai Wang
,
Xiao Zhang
Qualitative Analysis of Fault Tree Diagnosis for TCAS Data Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-131
by
Kun Hu
,
Yong Zeng
,
Xiaomin Xie
,
Jianghuai Du
Design and Implementation of Course Selection System based on SpringCloud Micro-service Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-135
by
Lang Pei
,
Lei Peng
Research on the Competency Model of University Teachers under the Background of Curriculum Ideological and Political Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-139
by
Guoping Li
,
Yongfang Qi
Study on the Comprehensive Evaluation System of Pingxiang Cultural Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-143
by
Guoping Li
Design and Implementation of Big Data Analysis Algorithm in Ciphertext Domain Based on Homomorphic Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-150
by
Yun Fan Huang
,
Dian Hua Tang
,
Wei Zhao
,
Juan Ren
,
Xiao Peng Yu
An Empirical Analysis of the Influencing Factors of Chinese College Students' Credit Card Consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
Yajie Zhu
,
Yali Wu
Internet of Things Gateway Fabrication
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Yandong Sun
,
Tongliang Fan
The Countermeasures of Big Data and Its Intelligent Processing in the Internet of Things Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-164
by
Deng Meiling
,
Chen Qiang
The Impact of the Development of the Internet of Things on the Robotics Engineering Profession
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-168
by
Libo Yang
Reform of Engineering Drawing Curriculum System Based on Emerging Engineering Education Concept and First-Class Curriculum Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-173
by
Yan Lijing
,
Li Zhenzhen
,
Wang Jiaojiao
The Principle of Firewall Technology and Its Application in Computer Network Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-177
by
Min Xiao
,
Mei Guo
,
Hong Lv
An Experimental Study on the Disyllabic Tones of Lhasa Dialect
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-181
by
Wang Hongjie
,
Li Yonghong
Analysis on Development and Construction Methods of Smart Home System in the Context of Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Hongwei Zhu
,
Bo Zhou
,
Qiuhong Gao
,
Bingchao Huang
,
Chenglonz Zhai
Research on Tone Perception of Tibetan Native Speakers in Mandarin Based on Acoustic Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-190
by
Wang Hongjie
,
Li Yonghong
,
Hu Axu
Word Embedding-based Context-sensitive Network Flow Payload Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-194
by
Yizhou Li
,
Yijie Wang
,
Li Cheng
,
Hongzuo Xu
Improved and Comparative End to End Delay Analysis in CBS and TAS using Data Compression for Time Sensitive Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-201
by
Md Mehedi Hasan
,
He Feng
,
Md Tanvir Hasan
,
Bipro Gain
,
Md Ibrahim Ullah
,
Shahrukh Khan
A Phishing Detection Method Based on Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-205
by
Chunzhi Li
Reconfigurable Aggregation Tree for Distributed Machine Learning in Optical WAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-210
by
Ling Liu
,
Hongfang Yu
,
Gang Sun
Design of Hybrid Wireless Network on Chip and Maximum Three Hops Routing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Yuling Liu
Practice of Reform Approach of Deep Integration of the Craftsman Spirit with Chinese Characteristics and Vocational Education based on I Ching -A Case Study of Software Technology Specialty
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-221
by
Xiong Dengfeng
,
Zhou Haizhen
,
Huang Lihong
The Prediction of Apple Inc. Stock Price with Machine Learning Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Xinyue Zhao
An Experimental Study on Mandarin Tones of Dongxiang Male College Students in Gansu Province
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-230
by
Fu Zhang
,
Dawa Pengcuo
,
Mouqing Wang
Gymnasium Simulation Design and Implementation Based on 3D Virtual Building
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Yiren Zhou
,
Hua Luo
,
Tingting Yang
,
Zhiqiang Guo
File Text Recognition and Management System Based on Tesseract-OCR
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-239
by
Tao Ma
,
Min Yue
,
Chao Yuan
,
Haibo Yuan
Application of Artificial Intelligence in Customer Service Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-244
by
Xingping Wu
,
Xusheng Liu
,
Qianjun Wu
,
Xiaolong Wang
Research on Data Synchronization Technology Based on Water Conservancy Distributed Data Storage Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-249
by
Chaolin Luo
,
Shuaihao Huang
,
Wufen Chen
,
Bo Zhang
,
Qibin Liang
Reliability Analysis of Different Fault-Tolerant Mechanisms in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-256
by
Ruihao Wang
,
Yinghua Tong
,
Liqin Tian
,
Defang Wang
Sentence Segmentation in Chinese Standard Vehicles Verification Note Texts Based on Context Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-261
by
Haiying Xia
,
Ruifen Cheng
,
Xinlei Wei
,
Yingji Liu
Big Data Guided Vehicle Routing with Urgence Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-266
by
Tong Chen
,
Yangdan Ni
,
Ke Chen
,
Junlin Zhou
,
Xianke Zhou
Similarity Computing Method of Poly-Encoders Short Texts in Both Chinese and Lao Based on Part of Speech Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-271
by
Xuanda Li
,
Lanjiang Zhou
Research on A Fuzzy Clustering Partition Analysis Method for Circuit Fault Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-275
by
Xiaomin Xie
,
Yueqin Wang
,
Renwei Dou
,
Kun Hu
,
Ying Hong
New Word Discovery Algorithm for News
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-279
by
Song Wen
Research on Data Standard Compliance Testing of Transportation Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-284
by
Jing Deng
,
Zekun Geng
,
Zhigang Shen
Design of An Intelligent Transfer Robot with Color Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-291
by
Hanhong Tan
,
Jinye Song
Research on Learning Method of Attribute Network Representation for Edge Node Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Yiming Wang
,
Yimei Zhang
Research on Vehicle Safety in Accordance with EU Regulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-301
by
Zhao Hongxue
,
Wang Sanxia
,
Pang Zhifei
,
Zhou Wei
,
Li Xiao
Research on the Evaluation Technology of Automobile After-sales Service Based on Fuzzy Comprehensive Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-305
by
Chen Chen
,
Shanshan Yang
Multi-moving Target Recognition and Tracking Based on Mobile Robot Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-309
by
Shaoping Zhu
,
Leping Zhu
,
Yujie Liu
,
Yupei Yan
,
Jingxin Guan
,
Yongliang Xiao
Research on the Failure Mode of Safety Related Parts of Passenger Cars
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-314
by
Xiaojuan Yang
,
Fujia Liu
,
Shuquan Xv
Research and Implementation of Image Recognition FOR Certificate Sortingand Stamping Robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-318
by
Yujun Shan
,
Na Liu
,
Ming Yang
A Driving Early Warning Method Based on Multi-Factor Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-324
by
Jianglin Yu
,
Yun Zhang
Comparative Study of the HGA Test Process and the SDPT Process in the Mass Production of the Hard Disk Drive
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-330
by
Xiaoyan Li
How to Apply Artificial Intelligence in the Event of Equipment Failure
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-334
by
Jijin Zhu
Comprehensive Evaluation of Pingxiang Sponge City Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-338
by
Li Liang-song
,
Zhu Min
,
Qi Yong-fang
Grey Correlation Analysis of Producer Service and Manufacturing in Heilongjiang Province
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-342
by
Hongmei Dong
Causes of Errors in Machining Process Technology and Control Strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-346
by
Chen Liang
Repairmance Strategy Model of Intelligent System Information Facilities based on Repairmance Cost
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-350
by
Jingxiong Gao
,
Huaying Zheng
,
Bing Hao
,
Baojun Wu
,
Jinsuo Zhang
Research on Comprehensive Evaluation Method of Non Intervention Load Identification Terminal Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Yang Guochao
,
Yang Zhaowen
,
Feng Wei
,
Liu Jianjun
,
Wang Hongwei
Research on the Suspension Force Model for the Large-Air-Gap Permanent-Magnet Suspension Belt Conveyor
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Zhongxun Wang
,
Jietao Pu
Research on Dam Deformation Prediction Model Based on Wavelet Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-365
by
Chaolin Luo
,
Wufen Chen
,
Lijun Guo
,
Bo Zhang
,
Qibin Liang
A Predictive Current Control for Aerospace Servo Motor
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
Xiaoning Mu
,
Fumen Cai
,
Ruyue Zheng
,
Dengming Zhang
,
Dawei Gu
Research on Lean Improvement of Liquid Cooling Product Line
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-374
by
Yanan Zhao
,
Tao Jin
,
Yifei Tong
Impact of Resources and Leagile Strategy on Organizational Performance: An Empirical Study in the Context of the Apparel Supply Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-379
by
Syed Abdul Rehman Khan
,
Adeel Shah
,
Zhang Yu
,
Syed Taj Khan
Convolutional Neural Network Based Smart System to aid an Epileptic Patient
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-387
by
Md Mehedi Hasan
,
Md Ibrahim Ullah
,
He Feng
,
Md Tanvir Hasan
,
Bipro Gain
,
Shahrukh Khan
A Deep Learning Method on Audio and Text Sequences for Automatic Depression Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-392
by
Jing Xiao
,
Yongming Huang
,
Guobao Zhang
,
Wei Liu
Early Warning of Abnormal Sleep Breathing based on Multivariate State Estimation Method and Real-time Dynamic Baseline
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-397
by
Yiying Zhang
,
Yiyang Liu
,
Pengkai Wang
,
Delong Wang
Emotional Analysis of Clothing Product Reviews Based on Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-401
by
Ying Hong
,
Xiwen Shao
A Wireless and Wearable System for Fetal Heart Rate Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-407
by
Kai Hu
,
JianSong Xia
,
Bo Chen
,
Ruitao Tang
,
Ying Chen
,
Jun Ai
,
Hui Yang
Deep Learning Based Diagnosis of Alzheimer's Disease Using Structural Magnetic Resonance Imaging: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-412
by
Tian Wang
,
Lihong Cao
A Survey on Neural Machine Translation Applied to Sign Language Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 413-417
by
Yue Zhang
,
Lihong Cao
Intelligent Method of Non-Invasive Detection and Grading of Hypertension Using Fingertip Photoplethysmography
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-422
by
Mingwei Zhang
,
Tianyi Zhang
,
Yunzhang Cheng
Research on Ring Network Structure Optimization of Medium Voltage Distribution Network Considering Load Complementary Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-430
by
Yanwei Mao
,
Hongjun Li
,
Yudi Ding
,
Qiang Jin
,
Gang Yao
,
Jia Jin
Predicting SOC of Power Battery Based on GA-BP Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-434
by
Qiyan Yan
In-network Caching in Mobile Network: Research Issues and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-440
by
Shilong Xu
,
Kai Fu
,
Qingmin Jia
,
Renchao Xie
Single Stage Inverted Pendulum Controller Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-444
by
Xu Jiarui
,
Zhang Chunguang
,
Wang Ruixin
Application of PWM Control Technology in Photovoltaic Inverter Circuit
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-448
by
Wei Cuihua
Navigation Safety Monitoring System of Ship Bridge Area Based on Convolution Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-452
by
Keyin Miao
,
Renqiang Wang
,
Hua Deng
,
Jianming Sun
Showing 100 out of 113
Load More
Load All