Default Cover Image

2016 International Conference on Information System and Artificial Intelligence (ISAI)

June 24 2016 to June 26 2016

Hong Kong, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiv
PrefaceFreely available from IEEE.pp. xv-xv
Conference OrganizationFreely available from IEEE.pp. xvi-xvi
Program CommitteeFreely available from IEEE.pp. xvii-xviii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xix-xxiii
Top-k Query Based on Map ReduceFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Privacy as a MachineFull-text access may be available. Sign in or learn about subscription options.pp. 14-20
Research on the Architecture of Internet of Things Applied in Coal MineFull-text access may be available. Sign in or learn about subscription options.pp. 21-23
Dynamic Page Size Adjustment in Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
The Research of Intelligent Medical Devices Management System Based on RFID TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 29-33
Simulation and Analysis of the Communication between Deep Station and Moon DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 34-37
Research on Command and Control of MAV/UAV Engagement from the Cooperative PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 38-44
Extending Patchmatch Stereo to Multiple-View Case by Using Neighboring ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 45-49
Two-Phase Pricing Strategy Based on QoS Constraints in Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 50-55
A Projection Based Algorithm for Link Prediction in Bipartite NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 56-61
Morphological Segmentation of 2-D Barcode Gray Scale ImageFull-text access may be available. Sign in or learn about subscription options.pp. 62-68
High Quality Wave Front Reconstruction for Phase-Shifting Color Digital HolographyFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Global Social Event Extraction and Analysis by Processing Online NewsFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Design and Simulation of Physical Layer of IEEE 802.11p Vehicular Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Design and Implementation of an Automatic Visual Acuity Test SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 81-84
An Efficient Routing and Spectrum Assignment Algorithm Using Prediction for Elastic Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
A Topology Optimal Algorithm for Improving the Invulnerability of Scale-Free NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
The Design and Analysis of Campus Network under the Background of Triple PlayFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
Research on SLA-based Business Automatic Deployment of Private Cloud PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 104-108
Mappings between Two Covering Approximation SpacesFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
A Novel Schedulability Test Algorithm for Preemptive Real-Time Scheduling Problem in QCSPFull-text access may be available. Sign in or learn about subscription options.pp. 120-123
Modeling and Simulation Research of Kane Dynamics Method for the 5-DOF Modular Industrial RobotFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Research on the Intelligent Information System for the Multimedia Teaching Equipment ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Nonrigid 3D Reconstruction from a Single ImageFull-text access may be available. Sign in or learn about subscription options.pp. 138-142
Design and Implementation of Remote Control System between Android PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 143-147
The Analysis of Application of Cloud Computing in E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 148-151
Existence Results of Non-collision Periodic Solutions for Third-Order Singular Dynamical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 152-158
Research on the Security of Multi-frequency Road Broadband MIMO Medical Special-Purpose Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
Based on the Discharge of the Goods Problems and Solving TSP ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 164-167
A Survey on the Studies of Security Guard Technology for MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 172-175
Modeling of Software Aging Based on Non-stationary Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
Binary Vulnerability Exploitability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
AFDD: Automatic Fault Detection Daemon via Event-TracingFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
A Resilient Data Fusion Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Hybrid Scheduling Deadline-Constrained Multi-DAGs Based on Reverse HEFTFull-text access may be available. Sign in or learn about subscription options.pp. 196-202
The Improvement of a Data Cached Strategy Based on Eventual Consistency TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 203-207
Locality-Aware Concurrency-Driven IssueFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
JMS Scheduling Model Design and Implementation Based on Priority Control in the SOA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 214-218
IoT-based Detection for Tropical FlowerFull-text access may be available. Sign in or learn about subscription options.pp. 219-222
Error Performance Analysis of Minimum Mean-Square Error Linear Precoder for Spatial ModulationFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Design of Cloud-Based China's Community Care System for DiabetesFull-text access may be available. Sign in or learn about subscription options.pp. 228-231
Research on Management System of Disaster Prevention and Relief Based on Building Information ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 232-235
SIAW: An Adaptive Idleness-Aware Work-Stealing Strategy on Shared Memory MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Comparison and Evaluation of Routing Protocols Based on a Collaborative Simulation Using SUMO and NS3 with TraCIFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Learning Tree-Structured Data in the Model SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 258-266
An Effective Pseudonym Generating Scheme for Privacy and Anonymity in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 267-270
An Initiator-Beneficiary-Separated Strategy for ARP AttackingFull-text access may be available. Sign in or learn about subscription options.pp. 271-275
The Design of Public Opinion Analysis System Based on Micro-BlogFull-text access may be available. Sign in or learn about subscription options.pp. 276-280
MapReduce Frequent Itemsets for Mining Association RulesFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Prouter: Privacy Preserving Multi-user Behavioral Advertising via Smart RouterFull-text access may be available. Sign in or learn about subscription options.pp. 285-289
Research on the Extraction Algorithm of RT Mold Geometry Feature Based on STL ModelFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Study of a Novel Wireless Indoor Positioning System for MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 296-299
A Method to Guarantee Real-Time for Software-Defined Radio in User-SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 300-304
A Fast Algorithm for Single Image Super-Resolution Reconstruction via Revised Statistical Prediction ModelFull-text access may be available. Sign in or learn about subscription options.pp. 305-309
A Novel Approach for Analyzing EEG Signal Based on SVMFull-text access may be available. Sign in or learn about subscription options.pp. 310-313
The Improvement of QKD Scheme Based on BB84 ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 314-317
Application of One-Class Classification in NLOS Identification of UWB PositioningFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
A Novel Deep Model for Biopsy Image GradingFull-text access may be available. Sign in or learn about subscription options.pp. 323-326
A Method of Temperature Prediction and Velocity Control Based on BP Artificial Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 327-331
Using Emotions as Intrinsic Motivation to Accelerate Classic Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
A New Sparse Representation Classifier (SRC) Based on Probability Judgement RuleFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
A New Frame Based on Particle Filter for Moving Target TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 343-346
Speech Recognition and Synthesis Algorithm for Digital Hearing Aids under Background NoiseFull-text access may be available. Sign in or learn about subscription options.pp. 347-351
Phoneme Recognition Based on Deep Belief NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 352-355
Indoor Positioning Algorithm Based on Parallel Multilayer Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 356-360
Electricity Consumption Forecast Based on Wavelet Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
Bilevel Genetic Algorithm with Clustering for Large Scale Traveling Salesman ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 365-369
The Design of Human-Robot Spatial Cognition Interaction SystemFull-text access may be available. Sign in or learn about subscription options.pp. 370-374
Research on Path Planning Algorithm of Intelligent Mowing Robot Used in Large Airport LawnFull-text access may be available. Sign in or learn about subscription options.pp. 375-379
Cooperative Operational Path Planning of Airborne ARM and ASPFull-text access may be available. Sign in or learn about subscription options.pp. 385-389
A Novel Vessel Segmentation in Fundus Images Based on SVMFull-text access may be available. Sign in or learn about subscription options.pp. 390-394
Syllable Segmentation of Pumi Speech with GABPNN Based on Fractal Dimension and DWPTMFCCFull-text access may be available. Sign in or learn about subscription options.pp. 395-400
Improvement of Dynamic Hand Gesture Recognition Based on HMM AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 401-406
Industry 4.0 Development and Application of Intelligent ManufacturingFull-text access may be available. Sign in or learn about subscription options.pp. 407-410
Unsupervised Extraction of Roles from Large-Scale Mail ArchivesFull-text access may be available. Sign in or learn about subscription options.pp. 411-414
Using NIR with Support Vector Regression to Predict the Crude Protein of AlfalfaFull-text access may be available. Sign in or learn about subscription options.pp. 415-418
Application of Extreme Learning Machine Algorithm in the Regression FittingFull-text access may be available. Sign in or learn about subscription options.pp. 419-422
A Semi-supervised Intrusion Detection Algorithm Based on Natural NeighborFull-text access may be available. Sign in or learn about subscription options.pp. 423-426
A Modified Particle Swarm Optimization Algorithm Using Uniform DesignFull-text access may be available. Sign in or learn about subscription options.pp. 432-435
Road Lane Detection with Gabor FiltersFull-text access may be available. Sign in or learn about subscription options.pp. 436-440
A Multi-swarm Artificial Bee Colony Algorithm for Dynamic Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 441-445
Damage Detection in Cross-Ply CFRP Based on Open Electrical Impedance TomographyFull-text access may be available. Sign in or learn about subscription options.pp. 446-450
Showing 100 out of 141