Default Cover Image

2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA)

Oct. 26 2019 to Oct. 27 2019

Xiangtan, China

ISBN: 978-1-7281-4284-5

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-19
PrefaceFreely available from IEEE.pp. 20-20
Conference OrganizationFreely available from IEEE.pp. 21-22
ReviewersFreely available from IEEE.pp. 23-23
Analysis of Antimicrobial Interaction Based on Improved Apriori AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Chaos of a Dry Friction Oscillator with Periodic ExcitationFull-text access may be available. Sign in or learn about subscription options.pp. 7-10
Combat Decision-Making Modeling Method Based on Genetic Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 11-15
Combining a Deep Convolutional Neural Network with Transfer Learning for Ship ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 16-19
Design and Realization of an Okumura-Hata Model-Based Programmable AttenuatorFull-text access may be available. Sign in or learn about subscription options.pp. 20-23
Economic Benefits and Optimization Assessment of New Energy GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
Evaluation Model of Rural Poverty Alleviation Effect in Heilongjiang Province Based on Inclusive Financial OrientationFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
Evaluation on Expressiveness of Impressionist Piano Performance Teaching under the Application of Information TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 36-44
Feasibility Analysis of Environmental Engineering Teaching Considering Domestic Cloud Computing TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 45-49
Fusion Analysis of Modern Music and Classical Opera Considering Fourier Algorithm AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 50-53
Hydrodynamic Performance of the Cross-Sea Bridge Substructure under Wave and CurrentFull-text access may be available. Sign in or learn about subscription options.pp. 54-58
Implementation of Schema Learning Optimized Cultural Algorithms in Ceramic Art Innovative DesignFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
International Trade Economic Benefits Assessment Considering Classical Probability DensityFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
Multi-Criterion Attribute Reduction Based on Fuzzy Rough Set ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 68-71
Performance Evaluation of Fully Polarized ISAR Compressed Sensing AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 72-76
Research on CSI 300 Index Volatility Based on GARCH ModelFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Research on Energy Level Identification Technology of Urban Road Network NodesFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Research on Improvement of Parallel Apriori Algorithm Based on Boolean Matrix and WeightFull-text access may be available. Sign in or learn about subscription options.pp. 96-99
Research on Optimal Strategy of Energy Router Based on Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
Research on Optimization Design of Topology and Size of the Body Structure for New Energy VehicleFull-text access may be available. Sign in or learn about subscription options.pp. 104-107
Research on the Present Situation and Optimum Analysis of Lighting Energy-Saving Technology in Residential AreasFull-text access may be available. Sign in or learn about subscription options.pp. 112-116
Research on the Technology of Trojan Horse DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 117-119
Stochastic Text Sentiment Analysis of Modern Chinese Literature Using Fast Fourier TransformFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Study on Composite Electromagnetic Scattering Characteristics of Air-Floating Corner Reflector and ChaffFull-text access may be available. Sign in or learn about subscription options.pp. 129-133
Study on Micro Influencing Factors of Traffic Conflicts in Subgrade Stage of Expressway Construction AreaFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Study on Similar Materials for Coal Oxidation Heating Process Based on Multi-Objective Decision Analysis of TopsisFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
Study on the Design of Smart Scenic Spots Based on Smart Tourism – A Case Study on the Ancient City of SuzhouFull-text access may be available. Sign in or learn about subscription options.pp. 145-148
Study on the Influence of HPM Backpan Offset to HRMD BacksetFull-text access may be available. Sign in or learn about subscription options.pp. 149-153
The Application of Optimized Pattern Learning Cultural Algorithm in Innovative Design of Environmental ArtFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
Wind Power Prediction Based on VMD-Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
A BERT-BiLSTM-CRF Model for Chinese Electronic Medical Records Named Entity RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
A Defense against Adversarial Examples via Image SqueezingFull-text access may be available. Sign in or learn about subscription options.pp. 170-174
A Study on Efficiency Evaluation for Interaction Design in Virtual Environments with Digital Media ContentsFull-text access may be available. Sign in or learn about subscription options.pp. 175-181
Application and Realization of VR Technology in Interior DesignFull-text access may be available. Sign in or learn about subscription options.pp. 182-186
Application of Vr Technology in Comprehensive Experiment of Pharmaceutical EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 187-189
Automatic Reconstruction of 3D Vascular Model for Mixed RealityFull-text access may be available. Sign in or learn about subscription options.pp. 190-193
Design of Constant Temperature Energy Saving Cooling System for Intelligent ATS Vehicle EngineFull-text access may be available. Sign in or learn about subscription options.pp. 194-198
Identification Technology of Transmission Line Defects Based on UAV Infrared ImageFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
Multi-Target Tracking and Segmentation Method for Missile-Borne Image Based on IoU AssociationFull-text access may be available. Sign in or learn about subscription options.pp. 207-211
Research and Application of Chinese Paints Classification and Recognition for Identifying Hyperspectral Imaging TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Research on QoS-Oriented Virtual Machine Migration Strategy in Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 227-231
Research on the Real-Time Rendering of Global Illumination of the Virtual Reality System Based on Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 236-239
Research on Video Smoke Recognition Based on Dynamic Image Segmentation Detection TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 240-243
RGBD Saliency Object Detection via Regional Feature ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 244-249
Summary about Detection and Tracking of Infrared Small TargetsFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
The Optimal Design of Digital Media Interactive Virtual Vision Based on the Reconstruction of Dual ViewpointsFull-text access may be available. Sign in or learn about subscription options.pp. 254-258
Visualization Analysis of Multidimensional Data for Online Transaction LogFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
A Hybrid Cloud Intrusion Detection Method Based on SDAE and SVMFull-text access may be available. Sign in or learn about subscription options.pp. 271-274
A Network Design Optimization Model for Defense Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 275-281
Construction of Network Active Security Threat Model Based on Offensive and Defensive Differential GameFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Enterprise Network Marketing Strategy Based on SNS Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Learning Bayesian Networks Parameters via Monotonicity ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 300-303
Maintenance Optimization Algorithm of Internet of Things Perceived Layer Cluster Based on High Network Life CycleFull-text access may be available. Sign in or learn about subscription options.pp. 304-308
Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 309-316
Research and Application of Floyd Algorithm Based on SDN NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 317-320
Research on Collision Problem in Random Access Process of TD-LTE SystemFull-text access may be available. Sign in or learn about subscription options.pp. 321-323
Research on Functional Design of Smart Home Appliances under the Background of Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 324-327
Research on Social Media Information Network Archiving under the Background of Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 333-336
Research on the Anti-Interference Method of the Network-Based Electric Data Link Based on Kalman FilterFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
Research on Underwater Communication Based on Acoustic WaveFull-text access may be available. Sign in or learn about subscription options.pp. 343-345
Semantic Segmentation Network with Local Multi-Scale Attention for Locating Traffic SignFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
The Current Main Distributed Denial of Service and Defence MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
The Debug Environment of TI-RTOS Based on Beaglebone BlackFull-text access may be available. Sign in or learn about subscription options.pp. 356-359
A Flexible Live Broadcast Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 360-363
Agricultural Internet of Things System Based on Cloud Computing and Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 364-367
An Improved Network Broadcast System Based on MongoDBFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
Analysis and Prediction of Massive Electricity Information Based on Hadoop Ha ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 372-376
Application Research of Rural Financial Service System Based on Intelligent TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 377-380
Automobile Driver Behavior Recognition System Based on B/SFull-text access may be available. Sign in or learn about subscription options.pp. 381-386
Design and Implementation of Telemedicine Nursing Monitoring System Based on AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 391-394
Design Method of Train Route in Railway Hub StationFull-text access may be available. Sign in or learn about subscription options.pp. 395-399
Design of Automatic Irrigation and Fertilization Data Acquisition System Based on Revolving Door AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 400-407
Individualized Recommendation Method of Rural Landscape Based on Collaborative FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 408-411
Optimization of Ato Operation Process of Urban Rail Train Based on Sa-Abc AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 412-416
Remote Management System for Diabetic Diet Based on Internet of Things TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 422-427
Research on Information System Security Protection StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 428-430
Research on Real-Time Safety Evaluation Method of Freeway Traffic Flow in Car-Following StateFull-text access may be available. Sign in or learn about subscription options.pp. 434-437
Showing 100 out of 161