Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICICTA
ICICTA 2019
Generate Citations
2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA)
Oct. 26 2019 to Oct. 27 2019
Xiangtan, China
ISBN: 978-1-7281-4284-5
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-19
Preface
Freely available from IEEE.
pp. 20-20
Conference Organization
Freely available from IEEE.
pp. 21-22
Reviewers
Freely available from IEEE.
pp. 23-23
Analysis of Antimicrobial Interaction Based on Improved Apriori Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Li Ya
,
Ma Chun
,
Yan Guiming
Chaos of a Dry Friction Oscillator with Periodic Excitation
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-10
by
Wen Wang
,
Liangqiang Zhou
Combat Decision-Making Modeling Method Based on Genetic Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-15
by
Junfeng Zhang
,
Qing Xue
,
Lin Chen
,
Qing Deng
Combining a Deep Convolutional Neural Network with Transfer Learning for Ship Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-19
by
Zhou Hui
,
Chu Na
,
Liu ZhenYu
Design and Realization of an Okumura-Hata Model-Based Programmable Attenuator
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-23
by
Weiqing Tian
,
Chuanfei Qiu
,
Zhichao shao
,
Huiyu Nie
Economic Benefits and Optimization Assessment of New Energy Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-28
by
Guang-Chen Shi
,
Jun-peng Zhu
Evaluation Model of Rural Poverty Alleviation Effect in Heilongjiang Province Based on Inclusive Financial Orientation
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-35
by
Ren xinpeng
,
zhang tao
Evaluation on Expressiveness of Impressionist Piano Performance Teaching under the Application of Information Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-44
by
Zhichao Yu
Feasibility Analysis of Environmental Engineering Teaching Considering Domestic Cloud Computing Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-49
by
Huihua Lv
Fusion Analysis of Modern Music and Classical Opera Considering Fourier Algorithm Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-53
by
Yan Hong
Hydrodynamic Performance of the Cross-Sea Bridge Substructure under Wave and Current
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-58
by
Wen Huang
,
Guangsheng Zuo
,
Panxing Jia
,
Tianhua Jiang
Implementation of Schema Learning Optimized Cultural Algorithms in Ceramic Art Innovative Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Jintian Zhou
International Trade Economic Benefits Assessment Considering Classical Probability Density
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Suqing Xu
Multi-Criterion Attribute Reduction Based on Fuzzy Rough Set Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-71
by
Wen Huixiang
,
Zhu Yue
,
Xu Zhengyuan
Performance Evaluation of Fully Polarized ISAR Compressed Sensing Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-76
by
Chaofan Guo
,
Peng You
,
Dongfang Guan
,
Puyu Liu
,
Shaowei Yong
Research on CSI 300 Index Volatility Based on GARCH Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-80
by
Xiaoxiao Zhang
Research on Detection Technology of Grounding Resistance of Transmission Line Tower Based on Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-86
by
Xiaohui Zhang
,
Yongqian Zhang
,
Yuan Gao
,
Guangxin Zhang
,
Liying Zhao
Research on Energy Level Identification Technology of Urban Road Network Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Han Zhi
,
He JiaoJiao
,
Dai Xuhao
Research on Fault Prediction of Radar Electronic Components Based on Analytic Hierarchy Process and BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-95
by
Zhengkun Dai
,
Lu Yao
,
Jiandong Qin
Research on Improvement of Parallel Apriori Algorithm Based on Boolean Matrix and Weight
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-99
by
Qin Xuan
,
Huo Jiuyuan
,
Wang Weitao
Research on Optimal Strategy of Energy Router Based on Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-103
by
Qinghan Wang
,
Zhe Chen
Research on Optimization Design of Topology and Size of the Body Structure for New Energy Vehicle
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-107
by
Guibin Sun
,
ying li
,
Wende Zhuo
Research on Reactive Power and Voltage Characteristics Analysis and Reactive Power Configuration Strategy of Active Distribution Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-111
by
Tingting Ma
,
Tieyan Zhang
Research on the Present Situation and Optimum Analysis of Lighting Energy-Saving Technology in Residential Areas
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-116
by
Tsz Wai Wong
Research on the Technology of Trojan Horse Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-119
by
Wen Yu
,
Ye Yalin
,
Ran Haodan
Solving Combined Decisions Problem of Advertising Investments and Transportation Scheduling by Intelligent Water Drops Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-123
by
Jiehui Jiang
,
Dezhi Zhang
,
Wei Xu
Stochastic Text Sentiment Analysis of Modern Chinese Literature Using Fast Fourier Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-128
by
Fengling Shou
Study on Composite Electromagnetic Scattering Characteristics of Air-Floating Corner Reflector and Chaff
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-133
by
Jun Zhang
,
Shengliang Hu
,
Qing Yang
,
Lingang Wu
Study on Micro Influencing Factors of Traffic Conflicts in Subgrade Stage of Expressway Construction Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Zhang Xin
,
Wang Pan
,
Wang Lei
,
Jia Yong
,
Jiang Ruoxi
Study on Similar Materials for Coal Oxidation Heating Process Based on Multi-Objective Decision Analysis of Topsis
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-144
by
Zhou Peiling
,
Yuan fei
Study on the Design of Smart Scenic Spots Based on Smart Tourism – A Case Study on the Ancient City of Suzhou
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-148
by
Yuan Li
Study on the Influence of HPM Backpan Offset to HRMD Backset
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-153
by
Lei Lou
,
Qi Feng
,
Zhixin Liu
The Application of Optimized Pattern Learning Cultural Algorithm in Innovative Design of Environmental Art
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-157
by
Liqin Huo
The Impact of Electric Vehicle Development on Grid Load Power and Electricity Consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-161
by
Xiaoxi Huang
,
Yesheng Fu
,
Jianping Zhang
,
Kangning He
,
Haozhong Cheng
,
Heng Zhang
Wind Power Prediction Based on VMD-Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-165
by
Donghong Gu
,
Zhe Chen
A BERT-BiLSTM-CRF Model for Chinese Electronic Medical Records Named Entity Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Wentao zhang
,
Shaohua Jiang
,
Shan Zhao
,
Kai Hou
,
Yang Liu
,
Li Zhang
A Defense against Adversarial Examples via Image Squeezing
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-174
by
Tu Ling
,
Liu Jianming
A Study on Efficiency Evaluation for Interaction Design in Virtual Environments with Digital Media Contents
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-181
by
Yancong Su
,
Junting Zhang
,
Murao Hajime
Application and Realization of VR Technology in Interior Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-186
by
Rui wang
Application of Vr Technology in Comprehensive Experiment of Pharmaceutical Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-189
by
Zhenhua Chen
,
Teng Zhao
,
Yuyu Xu
Automatic Reconstruction of 3D Vascular Model for Mixed Reality
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-193
by
Zhang Xiao-xing
,
Guo Rui-feng
,
Tong Zhi-yong
,
Wang Hong-liang
,
Wang Shuai
Design of Constant Temperature Energy Saving Cooling System for Intelligent ATS Vehicle Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-198
by
Zijian Chang
Identification Technology of Transmission Line Defects Based on UAV Infrared Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-206
by
Yilin Zhang
,
Jiwen Wang
,
Hongsong Miao
,
Zhipeng Wang
,
Guangxin Zhang
,
Yiping Li
Multi-Target Tracking and Segmentation Method for Missile-Borne Image Based on IoU Association
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-211
by
Chuan-dong Yang
,
Rui-chao Xie
,
Sheng-bin Shi
,
Zheng Tang
Object-Based Video Multi-Label Classification with an Improved 3D Convolutional Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Xiangchun Zhou
,
Yue Li
,
Yuan Jiao
,
Yangkexin Liang
,
Yichun Shang
,
Wei Wang
Research and Application of Chinese Paints Classification and Recognition for Identifying Hyperspectral Imaging Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Jie Zi
Research on Chaff Jamming Recognition Technology of Anti-Ship Missile Based on Radar Target Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-226
by
Shengliang HU
,
Lingang WU
,
Jun ZHANG
,
Jianghu Xu
Research on QoS-Oriented Virtual Machine Migration Strategy in Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-231
by
Bin Yang
,
Jinping Li
,
Ya Li
Research on the Influence of Short Video Information Presentation on Sales Volume Based on Communication and Persuasion Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-235
by
Jiacheng Hu
,
Fuliang Dai
,
Yuecheng Ou
,
Jiaying Chen
Research on the Real-Time Rendering of Global Illumination of the Virtual Reality System Based on Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-239
by
Wang Shi-an
Research on Video Smoke Recognition Based on Dynamic Image Segmentation Detection Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-243
by
Ethan liu
RGBD Saliency Object Detection via Regional Feature Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-249
by
Xiaojun Xia
,
Shuai Wang
,
Xiaodong Zhang
,
Lulu Cui
,
Zhiyang Zhao
Summary about Detection and Tracking of Infrared Small Targets
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Qinxia Chen
,
Askar Hamdulla
The Optimal Design of Digital Media Interactive Virtual Vision Based on the Reconstruction of Dual Viewpoints
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-258
by
Yancong Su
,
Jianxun Li
,
Junting Zhang
Traffic Conflict Prediction Model for Bottleneck Section of Expressway Construction Area Based on Video Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Jia Yong
,
Wang Lei
,
Zou He
,
Zhang Xing
,
Jiang Ruoxi
Visualization Analysis of Multidimensional Data for Online Transaction Log
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Yu Shidong
,
Yang Dongsheng
,
Feng Xue
,
Lian Mengjia
A Hybrid Cloud Intrusion Detection Method Based on SDAE and SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-274
by
Wenjuan Wang
,
Xuehui Du
,
Dibin Shan
,
Na Wang
A Network Design Optimization Model for Defense Resource Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-281
by
Huilin Shang
Compressed Sensing MRI Reconstruction Using Generative Adversarial Network with Enhanced Antagonism
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-285
by
Kai Wang
,
Jinxu Tao
,
Jiale Zhu
,
Zhongfu Ye
,
Bensheng Qiu
,
Jinzhang Xu
Computer Software Automatic Programming Parameter Optimization and Simulation Processing of Pen Barrel for Complex Parts of Nc Lathe
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-288
by
Hongfen Wang
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
A-jun Cui
,
Jia-yu Fu
,
Wei Wang
,
Hua-feng Zhang
Enterprise Network Marketing Strategy Based on SNS Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Wang Delu
Learning Bayesian Networks Parameters via Monotonicity Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-303
by
Shenglei Pei
,
Lijuan Ye
Maintenance Optimization Algorithm of Internet of Things Perceived Layer Cluster Based on High Network Life Cycle
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-308
by
Liu Ping
,
Wang LiHong
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-316
by
A-jun CUI
,
Chen li
,
Xiao-ming WANG
Research and Application of Floyd Algorithm Based on SDN Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-320
by
Bai Xue
,
Yang Guiqin
,
Jiang Zhanjun
Research on Collision Problem in Random Access Process of TD-LTE System
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-323
by
Liu Wanni
,
Duan Yonghong
Research on Functional Design of Smart Home Appliances under the Background of Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-327
by
Jinfeng Lei
Research on Point-To-Point Encryption Method of Power System Communication Data Based on Block Chain Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Hao Qin
,
Zhi Li
,
Peng Hu
,
Yulong Zhang
,
Yuwen Dai
Research on Social Media Information Network Archiving under the Background of Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-336
by
Yujing Huang
,
Yunzhi Wang
Research on the Anti-Interference Method of the Network-Based Electric Data Link Based on Kalman Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Zheng JianYun
,
Niu Hai
Research on Underwater Communication Based on Acoustic Wave
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-345
by
Lei Zheng
,
Bao-qin Wu
,
Jian Zhong
,
Xiao-lei Sun
Semantic Segmentation Network with Local Multi-Scale Attention for Locating Traffic Sign
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Shun Zhong
,
Zhuoyuan Zheng
,
Peipei Yang
The Current Main Distributed Denial of Service and Defence Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Wei Jinhui
The Debug Environment of TI-RTOS Based on Beaglebone Black
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-359
by
Chen Gangqiang
A Flexible Live Broadcast Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-363
by
Yongjian Zhao
Agricultural Internet of Things System Based on Cloud Computing and Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-367
by
Yuxing Long
An Improved Network Broadcast System Based on MongoDB
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-371
by
Yongjian Zhao
Analysis and Prediction of Massive Electricity Information Based on Hadoop Ha Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-376
by
Ke Ma
,
Jiayang Wang
Application Research of Rural Financial Service System Based on Intelligent Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-380
by
Zhang Tingting
Automobile Driver Behavior Recognition System Based on B/S
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-386
by
Haoran Liu
,
Ying Zhang
,
Lihui Liu
Design and Implementation of a Certain Type of Vehicle-Mounted Electronic Information System Condition Monitoring and Alarm System
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-390
by
Quanzhi Zhou
,
Chuanfei Qiu
,
Xiaofang Lou
,
Weiqing Tian
Design and Implementation of Telemedicine Nursing Monitoring System Based on Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-394
by
Yan Wang
Design Method of Train Route in Railway Hub Station
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-399
by
Feng Chen
,
Qi Zhang
,
Hongtao Zhao
Design of Automatic Irrigation and Fertilization Data Acquisition System Based on Revolving Door Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-407
by
Lihuan Liu
,
Wenping Wang
,
Yongmei Liu
,
Cen Jiang
Individualized Recommendation Method of Rural Landscape Based on Collaborative Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-411
by
Jie Tian
,
Hui Pan
Optimization of Ato Operation Process of Urban Rail Train Based on Sa-Abc Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-416
by
Li Yao
,
Liu Xiaojuan
,
Wei Wei
Rare Wild Animal Ecological Monitoring System Based on Internet of Things-A Case Study of Western Black Crested Gibbon
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Xingce Zhou
,
Zhenhua Guan
,
Enzhu Zhong
,
Youjie Zhao
,
Yang Dai
,
Kunrong Hu
Remote Management System for Diabetic Diet Based on Internet of Things Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-427
by
Minqiang Yin
,
Yuzhi Jiao
,
Shang Liang
,
Zekun Jiang
Research on Information System Security Protection Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-430
by
Ye Yalin
,
Wen Yu
,
Ran Haodan
Research on Key Technologies of Logistics Turnover Box Intelligent Management System in Chemical Industry Based on Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-433
by
Xiaoxian Zhang
,
Yan Zeng
Research on Real-Time Safety Evaluation Method of Freeway Traffic Flow in Car-Following State
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-437
by
Han Zhi
,
Zhang Jie
,
Han Song-Qiqo
Research on the Application of Artificial Intelligence Technology in Scientific Research Management in Colleges and Universities
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-441
by
Zhao Yongtao
Showing 100 out of 161
Load More
Load All