Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICBASE
ICBASE 2021
Generate Citations
2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)
Sept. 24 2021 to Sept. 26 2021
Zhuhai, China
ISBN: 978-1-6654-2709-8
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-20
Preface
Freely available from IEEE.
pp. 21-21
Committee Members
Freely available from IEEE.
pp. 22-23
Reviewers
Freely available from IEEE.
pp. 24-26
Special steel production under carbon emission constraints by big data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Boyue Yang
An exploration of live e-commerce paths from an algorithmic research perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Wenxi Zeng
,
Jingying Ding
,
Zehao Jin
Research on predicting heart attack through active learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-18
by
Peng Yuan
Research on Distinguishing Different State of Levitated water droplet Based on CNN algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Yiheng Chen
UAV Detection Based on Improved YOLOv4 Object Detection Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Run Niu
,
Yi Qu
,
Zhe Wang
FLBID: An Income Distribution Mothed Based on Bargaining for Participants in Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-33
by
JianFei Zhang
,
HaoRan Qi
Analysis of big data and cloud computing technology based on the library lending system
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-37
by
Xia Zhan
Recurrent Neural Networks algorithms and applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-43
by
Yuexing Chen
,
Jiarun Li
Path Planning of Manipulator Based on Improved RRT-Connect Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-47
by
Ying Zhu
,
Yanfeng Tang
,
Yawan Zhang
,
Yujun Huang
Research on the Housing Rent to Purchase Ratio Index Compilation Based on Internet Big Data -- Taking Beijing and Tianjin as Examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Yang Xin
,
Yang Gao
,
Yinning He
Research on ant colony optimization network access algorithm based on model of vehicle fog calculation
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-55
by
Weimin Gan
,
Juan Li
,
Yan Guo
Simulation of precipitation in 40 alpha world cities for the 20
th
century by means of random walk
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-61
by
Shaomin Yan
,
Guang Wu
Evaluation Models for Luminous Environment Satisfaction in Green Office Buildings Integrating Environmental and Spatial Attributes Based on Massive Data Samples
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
Liang Ji
,
Mengkun Hu
,
Lina Zhang
,
Yuncan Sun
Numerical simulation of scour effect on different types of piers
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Di Wu
,
Lu Cao
,
Yicheng Sun
Analysis of The Coordinated Development of Water Resources and Social Economy in Jinhua City Based on the GRA-Mathematical Statistical Analysis Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Yaolan Zhang
,
Haoyang Feng
Application of Grid and Entropy Weight-TOPSIS Model in Collision Risk Assessment Caused by Environmental Factors in Port Waters
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-88
by
Fangwen Bi
,
Yuhui Fu
Spatial differentiation of sea surface salinity in the South China Sea and the adjacent Northwest Pacific based on big data analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-95
by
Xin Wang
,
Jiancheng Kang
,
Li Zhou
,
Xiangchun Meng
,
Yutong Hua
,
Zhiwei Chen
Numerical simulation analyzes the environmental impact of the reclamation project on the nearby sea area
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-100
by
Tianhang Zou
,
Wenbin Yin
,
Menghan Yu
Research on Reconstruction of Underpass Expressway Bridge Through data analysis and simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-107
by
Xican Zhao
,
Dengfeng Chen
Construction and Research of Virtual Forest Environment Based on Spatial Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-111
by
Yuan Yang
Numerical simulation analysis of the construction process of a large-span variable-section tunnel
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-115
by
Xudong Jiang
,
Runke Huo
,
Shuguang Li
,
Wei Li
,
Xiaoge Li
,
Xingzhi Yang
Unsupervised Detection Algorithm of Concrete Bridge Cracks in Complex Environment Based On Digital Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-119
by
Shiyuan Sun
Research on Personalized Learning Route Model Based on Improved Collaborative Filtering Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-123
by
Hongbin Wang
,
Zhengang Wei
Tracking and detecting network traffic based on capacity data prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-128
by
Linwei Huang
Acquisition Functions in Bayesian Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-135
by
Weiao Gan
,
Ziyuan Ji
,
Yongqing Liang
Research on Economic Value Evaluation of Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-139
by
Tieshuang Sun
Application of Improved DBSCAN Clustering Method in Point Cloud Data Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-144
by
Chunxiao Wang
,
Xiaoqing Xiong
,
Houqun Yang
,
Xiaojuan Liu
,
Lu Liu
,
Shihao Sun
An Ensemble Learning Approach of Multi-Model for Classifying House Damage
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-152
by
Junqiao Fan
,
Chun Xu
,
Jiahe Zhang
The Performance of Different Algorithms to Solve Traveling Salesman Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-156
by
Hanqing Bi
,
Zhuoyuan Yang
,
Mengxi Wang
COVID-19 Face Mask Restoration Using Pix2pix model
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-161
by
Liang Hong
,
Tianqi Wang
Preliminary Discussion on Production Scheduling Optimization of Garment Intelligent Manufacturing System based on Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-166
by
Yalin Dong
Research on chemical reaction prediction model based on Fairseq
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-171
by
Tingting Wang
An auxiliary tool for preliminary tests of skin cancer : A self-modifying meta-learning method for clean and noisy data
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-176
by
Yifeng Cao
,
Yuefan Wu
,
Zhenyu Tian
,
Xuan Yu
Transfer Learning Performance Analysis for VGG16 in Hurricane Damage Building Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-184
by
Jiayi Li
,
Zhenyu Liang
,
Can Xiao
Detection algorithm of pulmonary nodules based on deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Weiguo Zhang
,
Linfang Cui
Cloud resource prediction model based on LSTM and RBF
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-194
by
Na Zhang
,
Yifan Su
,
Biao Wu
,
Xiaomei Tu
,
Yuting Jin
,
Xiaoan Bao
The Choice of Kernel Function for One-Class Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-198
by
Jiaoyang Li
,
Lingfeng Zuo
,
Tianyu Su
,
Zihan Guo
A Task Schedule Approach for Heterogeneous Storm Based on Particle Swarm-Load Balancing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-202
by
MingZhuo Zou
,
HuiYong Liu
A Terminal Homing Control Method of Parafoil Based on Deep Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-209
by
Anmin Liu
,
Zhiwei Feng
,
Qingbin Zhang
,
Guobin Zhang
The Comparison of Some Algorithm Based on Ceemdan
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Sijin Wang
,
Yiran Shao
,
Jingwen Qian
,
Shuhan Sun
,
Siyuan Yu
Research on the classification of the paintings of 10 impressionist painters through deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-223
by
Congren Dai
A Discriminative Graph Neural Network for Fake News Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-228
by
Honghao Cao
,
Junhao Deng
,
Guoxuan Dong
,
Dewei Yuan
A differential privacy preserving algorithm for greedy decision tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-237
by
Shudan Yang
,
Nan Li
,
Daozhu Sun
,
Qiming Du
,
Wenfu Liu
MTMS: A Fact-Corrected Summarization model Based on Multitask Learning and Multimodal Fusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-247
by
Xia Ye
,
Zengying Yue
,
Ruiheng Liu
,
Qiduo Lu
A New Radiation Source Identification Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-252
by
Jing Zhao
,
Panpan Yang
,
Haihong Zhang
,
Jinchao Lin
General Pacman AI: Game Agent With Tree Search, Adversarial Search And Model-Based RL Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-260
by
Yang Zou
Transmission line safety early warning technology based on multi-source data perception
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-264
by
Tuo Shen
,
Xiaolong Liang
,
Bao Zhang
,
Guang Yang
,
Dongye Li
,
Jiwen Zu
,
Sihang Pan
A Bootstrapped Transfer Learning Model Based on ResNet50 and Xception to Classify Buildings Post Hurricane
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Zijin Wan
,
Tianyang Gu
Quantum walk based quantum secret sharing in a verifiable framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Changbin Lu
,
Fuyou Miao
,
Junpeng Hou
,
Yu Ning
Revenue-Aware Edge Server Deployment Algorithm in Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-280
by
Bing Fan
,
Youdan Shi
Seepage and stability analysis of landslide of Transmission Tower Foundation based on MIDAS simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-284
by
Wenxiong Mo
,
Weinan Fan
,
Junxiang Liu
,
Le Luan
,
Zhong Xu
,
Kai Zhou
Research on prediction of tower mechanical response in wind field based on multi-layer perceptron
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-289
by
Wenxiong Mo
,
Weinan Fan
,
Junxiang Liu
,
Le Luan
,
Zhong Xu
,
Kai Zhou
Research on Fire Risk Coupling of Petrochemical Enterprises Based on Improved N-K Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-295
by
Qingqing Lv
,
Haomiao Ning
,
Kezhen Chen
,
Jihong Ye
Wellhead Assignment Model and Improved Hungarian Algorithm for Large Scale Cluster Well Group
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-299
by
Desheng Yue
,
Yucai Shi
,
Xuan Chen
,
Guanghao Shao
,
Di Chang
,
Wensheng Zhang
Study on Driving Forces of Agricultural Development in the Zuli River Basin Based on Multiple Regression and Path Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-303
by
Rui Guo
Simulating Non-Darcy flow by integrating Forchheimer equation with LPF package of MODFLOW
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-307
by
Linxian Huang
,
Hongqian Chen
,
Yong Qian
,
Guoqing Sang
,
Liting Xing
,
Henghua Zhu
,
Hao Liang
,
Hao Xu
Finite element analysis of stress transfer of circular end concrete filled steel tubular short columns under different loading conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-311
by
Bing Li
,
Jin Xie
Finite element analysis and application of the concrete under anchor
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-318
by
Liang Xu
,
Bingbing Huang
,
Zhao Li
,
Bin Wang
Monitoring and finite element analysis of deep horizontal displacement of foundation pit enclosure pile of a subway transfer station during construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-323
by
Wei Sun
,
Haojie Chen
,
Bing Li
,
Yafeng Liu
Animal face classification based on deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-330
by
Shiwen Han
,
Qiuxin Gao
,
Chaoyu Wang
,
Jiawei Zou
An adaptive learning-based weakly supervised object detection via context awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Xiaoran Zeng
,
Zhenhua Li
,
Weidong Zhang
Construction of co-occurrence relationship between pedestrians based on smart face capture cameras’ data
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Shiqi Qu
,
Yuning Liu
,
Bingbing Fan
A Research of object detection on UAVs aerial images
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-345
by
Xiaozhu Xie
,
Gang Lu
Analysis of Spatial-temporal Variation Characteristics of Vegetation in the Yellow River Source Region from 1982 to 2019
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Siqi Gao
,
Jun Liu
,
Guotao Dong
,
Xiaohui Jiang
,
Huijuan Yin
,
Yuxin Lei
,
Tong Nie
Dynamic change of water surface area in Baiyangdian by MNDWI
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-357
by
Yanan Qi
,
Hongtao Dou
,
Haiping Li
,
Weijia Wang
Time series simulation method of meteorological elements based on ARIMA model
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-362
by
Qian Wang
Research on flood level forecasting in tidal river based on mixture regressive model
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-371
by
Lijie Shan
,
Bin Tang
,
Yaolan Zhang
,
Huan Zhou
Analysis of Influences of Height-span ratios Variations on Earth Pressure for High Filled Cut-and-Cover Tunnel Based on the PFC
2D
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-376
by
Haobin Hou
,
Sheng Li
,
Yongze He
,
Zhugang You
Face Generation using DCGAN for Low Computing Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-382
by
Weichen Liu
,
Yuxuan Gu
,
Kenan Zhang
Imageological Examination of Pulmonary Nodule Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-386
by
Zisen Shao
,
Guangze Wang
,
Chengwei Zhou
Research on Cable Defect Recognition Technology Based on Image Contour Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-391
by
Jia Xie
,
Tao Sun
,
JiaQing Zhang
,
LiangPeng Ye
,
MingHao Fan
,
MingZhe Zhu
Security Verification Method of Embedded Operating System Semaphore Mechanism based on Coq
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-395
by
Xi Chen
,
Lei Qiao
,
Hongbiao Liu
,
Zhi Ma
,
Jingjing Jiang
A Semantic Segmentation Method for Remote Sensing Images based on Deeplab v3
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-400
by
Zhaoyong Qian
,
Yuhua Cao
,
Zengkai Shi
,
Luyi Qiu
,
Chenguang Shi
Robustness Analysis for VGG-16 Model in Image Classification of Post-Hurricane Buildings
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-407
by
Haoyang Li
,
Xinyi Wang
Prediction of Electricity Consumption Based on the Combination of LSTM and LassoLars
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Pan Hu
,
Liang Bai
,
Jun Qi
,
Ruiting Qu
,
Hailin Gu
,
Nan Hu
The AlexNet, LeNet-5 and VGG NET applied to CIFAR-10
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Xinche Zhang
EMG-Based Gesture Recognition System and Its Hardware Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-428
by
Congjie Wang
,
Shizhen Wang
,
Xuechen Zhao
,
Junxi Fang
,
Mingyuan Zhang
A game-theoretic approach to understand transaction mode selection in electric markets: an evolutionary multi-agent artificial intelligent based algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-434
by
Ran Ran
,
Jue Bo
,
Yubo Liu
,
Yu Xia
,
Fei Hu
,
Nan Hu
Speech Generation by Generative Adversarial Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-438
by
Yijia Chen
Tibetan lip reading based on D3D
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-442
by
Zhenye Gan
,
Xinke Yu
,
Hao Zeng
,
Tianqin Zhao
Verification Code Recognition Based On Active Learning And Convolutional Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-447
by
Xingqi Chen
Trajectory prediction of UAV Based on LSTM
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-451
by
Peng Shu
,
Chengbin Chen
,
Baihe Chen
,
Kaixiong Su
,
Sifan Chen
,
Hairong Liu
,
Fuchun Huang
Application of Ensemble Network Architecture Based on Convolutional Neural Network in Image Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-455
by
Zhuocheng Yu
,
Zhiqiang Zhang
,
Kehan Li
,
Le Wang
Handwriting Recognition Based on Resnet-18
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-459
by
Xiaoran Chi
,
Shuqi Huang
,
Jiayu Li
Face Aging using Generative Adversarial Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-466
by
Junru Hao
,
Dongyu Li
,
Hongyu Yan
Different CNNs for Enhancing Post-Hurricane Damage Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-470
by
Zhao Yang
,
Shuheng You
,
Zhengzhong Zhu
Segmentation and Classification: Application of Fully Convolutional Networks and Densely Connected Networks in Melanoma Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-477
by
He Cai
,
Dihan Li
,
Renyu Jiang
,
Yichao Shen
Comparison and Analysis of Two Cartoon Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-482
by
Zehui Li
Variants and Applications of Generative Adversarial Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-486
by
Gaohe Cai
,
Yumeng Sun
,
Yiwen Zhou
Handwriting Image Recognition Based on a GAN Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-491
by
Yinjie Du
,
Cin Jip Yau
Detecting Post Hurricane House Damage Using Geographic Information Related Multi-Resource Classification Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-501
by
Yihai Li
,
Shaotang Gu
Possible usage of computer vision technology for ceramic quality check
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-507
by
Jin Wang
Energy-Efficient UAV Communication With Trajectory Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-514
by
Jianan Yang
,
Jiajun Chen
,
Zelong Yang
Showing 100 out of 148
Load More
Load All