Default Cover Image

2022 IEEE/ACIS 22nd International Conference on Computer and Information Science (ICIS)

June 26 2022 to June 28 2022

Zhuhai, China

ISBN: 978-1-6654-9463-2

Table of Contents

Table of ContentsFreely available from IEEE.pp. xi-xiii
Title and Copyright PagesFreely available from IEEE.pp. i-ii
International Program CommitteeFreely available from IEEE.pp. v-vii
Message from General ChairFreely available from IEEE.pp. viii-viii
Message from Conference ChairsFreely available from IEEE.pp. ix-ix
Message from Program ChairsFreely available from IEEE.pp. x-x
Detection of COVID-19 Through Thermal and Voice Sensing Using SmartphoneFull-text access may be available. Sign in or learn about subscription options.pp. 2-7
Research on Text-based Q&A System Technology for Medical Aesthetic FieldFull-text access may be available. Sign in or learn about subscription options.pp. 14-19
Visual Marine Debris Detection using Yolov5s for Autonomous Underwater VehicleFull-text access may be available. Sign in or learn about subscription options.pp. 20-24
OSHA: A General-purpose and Next Generation One-way Secure Hash AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 25-33
Research on A Classification Algorithm of the Power System Related Objects Based on YOLOv4Full-text access may be available. Sign in or learn about subscription options.pp. 34-38
A Fuzzy Neural Network Control Strategy for Ship Maneuvering MotionFull-text access may be available. Sign in or learn about subscription options.pp. 39-42
An Algorithm for Solving The Traveling Salesman ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Wind speed prediction based on FWA-LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Recommendation Algorithm of Product Configuration based on Knowledge Graph OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Ship Navigation Safety Assessment Based on Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 71-75
High precision detection of small hepatocellular carcinoma using improved EfficientNet with Self-AttentionFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Construction and Application of the Knowledge Graph in Endangered PlantsFull-text access may be available. Sign in or learn about subscription options.pp. 82-87
Plane’s Detection in Border Area Using Modern Deep Learning MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 88-93
A Novel Robust Color Tag for a Highly Efficient Soccer Robot Vision SystemFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Chinese Named Entity Recognition based on BERTbased-BiLSTM-CRF ModelFull-text access may be available. Sign in or learn about subscription options.pp. 100-104
Chinese Named Entity Recognition based on BERT-CRF ModelFull-text access may be available. Sign in or learn about subscription options.pp. 105-108
Max Fusing Gated Recurrent Units and Ensemble Classifier for Intelligent Acoustic ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Using Extended Character Feature in Bi-LSTM for DGA Domain Name DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
A Trigonometric Function Instruction Set Extension Method Based on RISC-VFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
A Blockchain-driven Elastic Firmware Deployment Platform for TR-069 Compatible AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
On the SCL Decoding of Polar Codes in Power Line CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 137-139
Research of Super-Resolution Reconstruction based on Zooming Image SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
Fast Full-Wave Inversion with Quasi-Newton Method Based Speed of Sound ImagingFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Truncated Projection Artifacts Removal in Digital Breast TomosynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 150-155
Performance analysis of real-time object detection on Jetson deviceFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
MemInspect2: OS-Independent Memory Forensics for IoT Devices in Cybercrime InvestigationsFull-text access may be available. Sign in or learn about subscription options.pp. 162-169
Performance Evaluation of Text Embeddings with Online Consumer Reviews in Retail SectorsFull-text access may be available. Sign in or learn about subscription options.pp. 170-175
Comparison Between the Traditional and Deep Learning Algorithms on Image MatchingFull-text access may be available. Sign in or learn about subscription options.pp. 182-186
A Study of Language Landscape Adaptation in Smartphone AppsFull-text access may be available. Sign in or learn about subscription options.pp. 187-192
A Study on the Application of Modularization Theory to Chinese Typography DesignFull-text access may be available. Sign in or learn about subscription options.pp. 193-198
Research on the Application of Virtual Human Synthesis Technology in Human-Computer InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 199-204
Aspect Term Extraction Based on BiLSTM-CRF ModelFull-text access may be available. Sign in or learn about subscription options.pp. 205-211
Polaris for the Lost in Quantitative InvestmentFull-text access may be available. Sign in or learn about subscription options.pp. 212-217
SEDCN: An improved Deep & Cross Network Recommendation Algorithm based on SENETFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Knowledge-Based Multi-Behavior Recommendation with Factor DisentanglementFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Improved Protocol of Yao’s Millionaires ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 229-232
Research on the Design of Music Learning Applications for Preschool Children Based on Tangible InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 233-238
FIoTFuzzer: Response-Based Black-Box fuzzing for IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Principal Component Analysis Based on Different Starting PointsFull-text access may be available. Sign in or learn about subscription options.pp. 245-251
Research on the Reform Trend of Middle School Entrance Examination System in Henan Province Based on Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
A Concise Chinese Text Time Relationship Recognition SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 256-264
Key Nodes Mining in Complex Networks Based on Improved Pagerank AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 265-271
A Foot Model Extraction Algorithm Based On Open3DFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Film Analysis from the Perspective of Cinemeitrics Based on OpenCV and Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
Face Swapping for Film and Television Video based on FaceNet and Local Translation WarpFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
A Three-Way Decision Approach Combining Probabilistic and Decision-Theoretic Rough SetFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Author IndexFreely available from IEEE.pp. i-ii
Showing 60 out of 60