Default Cover Image

2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)

Sept. 24 2021 to Sept. 26 2021

Zhuhai, China

ISBN: 978-1-6654-2709-8

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-20
PrefaceFreely available from IEEE.pp. 21-21
Committee MembersFreely available from IEEE.pp. 22-23
ReviewersFreely available from IEEE.pp. 24-26
Special steel production under carbon emission constraints by big dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An exploration of live e-commerce paths from an algorithmic research perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Research on predicting heart attack through active learningFull-text access may be available. Sign in or learn about subscription options.pp. 12-18
Research on Distinguishing Different State of Levitated water droplet Based on CNN algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
UAV Detection Based on Improved YOLOv4 Object Detection ModelFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
FLBID: An Income Distribution Mothed Based on Bargaining for Participants in Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Analysis of big data and cloud computing technology based on the library lending systemFull-text access may be available. Sign in or learn about subscription options.pp. 34-37
Recurrent Neural Networks algorithms and applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 38-43
Path Planning of Manipulator Based on Improved RRT-Connect AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 44-47
Research on ant colony optimization network access algorithm based on model of vehicle fog calculationFull-text access may be available. Sign in or learn about subscription options.pp. 52-55
Simulation of precipitation in 40 alpha world cities for the 20th century by means of random walkFull-text access may be available. Sign in or learn about subscription options.pp. 56-61
Numerical simulation of scour effect on different types of piersFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Numerical simulation analyzes the environmental impact of the reclamation project on the nearby sea areaFull-text access may be available. Sign in or learn about subscription options.pp. 96-100
Research on Reconstruction of Underpass Expressway Bridge Through data analysis and simulationFull-text access may be available. Sign in or learn about subscription options.pp. 101-107
Construction and Research of Virtual Forest Environment Based on Spatial DataFull-text access may be available. Sign in or learn about subscription options.pp. 108-111
Unsupervised Detection Algorithm of Concrete Bridge Cracks in Complex Environment Based On Digital ImageFull-text access may be available. Sign in or learn about subscription options.pp. 116-119
Research on Personalized Learning Route Model Based on Improved Collaborative Filtering AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 120-123
Tracking and detecting network traffic based on capacity data predictionFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Acquisition Functions in Bayesian OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 129-135
Research on Economic Value Evaluation of Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 136-139
Application of Improved DBSCAN Clustering Method in Point Cloud Data SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
An Ensemble Learning Approach of Multi-Model for Classifying House DamageFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
The Performance of Different Algorithms to Solve Traveling Salesman ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 153-156
COVID-19 Face Mask Restoration Using Pix2pix modelFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Preliminary Discussion on Production Scheduling Optimization of Garment Intelligent Manufacturing System based on Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 162-166
Research on chemical reaction prediction model based on FairseqFull-text access may be available. Sign in or learn about subscription options.pp. 167-171
Transfer Learning Performance Analysis for VGG16 in Hurricane Damage Building ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
Detection algorithm of pulmonary nodules based on deep learningFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Cloud resource prediction model based on LSTM and RBFFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
The Choice of Kernel Function for One-Class Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 195-198
A Task Schedule Approach for Heterogeneous Storm Based on Particle Swarm-Load Balancing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 199-202
A Terminal Homing Control Method of Parafoil Based on Deep Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 203-209
The Comparison of Some Algorithm Based on CeemdanFull-text access may be available. Sign in or learn about subscription options.pp. 210-217
Research on the classification of the paintings of 10 impressionist painters through deep learningFull-text access may be available. Sign in or learn about subscription options.pp. 218-223
A Discriminative Graph Neural Network for Fake News DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 224-228
A differential privacy preserving algorithm for greedy decision treeFull-text access may be available. Sign in or learn about subscription options.pp. 229-237
MTMS: A Fact-Corrected Summarization model Based on Multitask Learning and Multimodal FusionFull-text access may be available. Sign in or learn about subscription options.pp. 238-247
A New Radiation Source Identification AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
General Pacman AI: Game Agent With Tree Search, Adversarial Search And Model-Based RL AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 253-260
Transmission line safety early warning technology based on multi-source data perceptionFull-text access may be available. Sign in or learn about subscription options.pp. 261-264
A Bootstrapped Transfer Learning Model Based on ResNet50 and Xception to Classify Buildings Post HurricaneFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
Quantum walk based quantum secret sharing in a verifiable frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
Revenue-Aware Edge Server Deployment Algorithm in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Research on prediction of tower mechanical response in wind field based on multi-layer perceptronFull-text access may be available. Sign in or learn about subscription options.pp. 285-289
Research on Fire Risk Coupling of Petrochemical Enterprises Based on Improved N-K ModelFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Study on Driving Forces of Agricultural Development in the Zuli River Basin Based on Multiple Regression and Path AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 300-303
Finite element analysis and application of the concrete under anchorFull-text access may be available. Sign in or learn about subscription options.pp. 312-318
Animal face classification based on deep learningFull-text access may be available. Sign in or learn about subscription options.pp. 324-330
An adaptive learning-based weakly supervised object detection via context awarenessFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
Construction of co-occurrence relationship between pedestrians based on smart face capture cameras’ dataFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
A Research of object detection on UAVs aerial imagesFull-text access may be available. Sign in or learn about subscription options.pp. 342-345
Dynamic change of water surface area in Baiyangdian by MNDWIFull-text access may be available. Sign in or learn about subscription options.pp. 351-357
Time series simulation method of meteorological elements based on ARIMA modelFull-text access may be available. Sign in or learn about subscription options.pp. 358-362
Research on flood level forecasting in tidal river based on mixture regressive modelFull-text access may be available. Sign in or learn about subscription options.pp. 363-371
Face Generation using DCGAN for Low Computing ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 377-382
Imageological Examination of Pulmonary Nodule DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 383-386
Research on Cable Defect Recognition Technology Based on Image Contour DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Security Verification Method of Embedded Operating System Semaphore Mechanism based on CoqFull-text access may be available. Sign in or learn about subscription options.pp. 392-395
A Semantic Segmentation Method for Remote Sensing Images based on Deeplab v3Full-text access may be available. Sign in or learn about subscription options.pp. 396-400
Robustness Analysis for VGG-16 Model in Image Classification of Post-Hurricane BuildingsFull-text access may be available. Sign in or learn about subscription options.pp. 401-407
Prediction of Electricity Consumption Based on the Combination of LSTM and LassoLarsFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
The AlexNet, LeNet-5 and VGG NET applied to CIFAR-10Full-text access may be available. Sign in or learn about subscription options.pp. 414-419
EMG-Based Gesture Recognition System and Its Hardware ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 420-428
Speech Generation by Generative Adversarial NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 435-438
Tibetan lip reading based on D3DFull-text access may be available. Sign in or learn about subscription options.pp. 439-442
Verification Code Recognition Based On Active Learning And Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 443-447
Trajectory prediction of UAV Based on LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 448-451
Application of Ensemble Network Architecture Based on Convolutional Neural Network in Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 452-455
Handwriting Recognition Based on Resnet-18Full-text access may be available. Sign in or learn about subscription options.pp. 456-459
Face Aging using Generative Adversarial NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 460-466
Different CNNs for Enhancing Post-Hurricane Damage ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 467-470
Comparison and Analysis of Two Cartoon Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 478-482
Variants and Applications of Generative Adversarial NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 483-486
Handwriting Image Recognition Based on a GAN ModelFull-text access may be available. Sign in or learn about subscription options.pp. 487-491
Detecting Post Hurricane House Damage Using Geographic Information Related Multi-Resource Classification ModelFull-text access may be available. Sign in or learn about subscription options.pp. 492-501
Possible usage of computer vision technology for ceramic quality checkFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
Energy-Efficient UAV Communication With Trajectory OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 508-514
Showing 100 out of 148