Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3448734acmotherconferencesBook PagePublication PagesdtmisConference Proceedingsconference-collections
CONF-CDS 2021: The 2nd International Conference on Computing and Data Science
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CONF-CDS 2021: The 2nd International Conference on Computing and Data Science Stanford CA USA January 28 - 30, 2021
ISBN:
978-1-4503-8957-0
Published:
17 May 2021

Bibliometrics
Abstract

No abstract available.

short-paper
An Efficient Iterative Algorithm for a Quaternion Matrix Equation with I-conjugate of Unknown Matrix
Article No.: 1, Pages 1–4https://doi.org/10.1145/3448734.3450453

We in this paper discuss the numerical method for a quaternion matrix equation with i-conjugate of unknown matrix. An iterative algorithm is proposed which can determine the solvability of the equation automatically. A solution can be obtained through ...

research-article
Research and Design of Cloud Broadcasting System
Article No.: 2, Pages 1–6https://doi.org/10.1145/3448734.3450454
short-paper
Research and Prospect of Two-wire Ethernet
Article No.: 3, Pages 1–6https://doi.org/10.1145/3448734.3450455
research-article
Performance Analysis of Interference Avoidance D2D Cellular Networks
Article No.: 4, Pages 1–9https://doi.org/10.1145/3448734.3450456

Performance of Device-to-Device (D2D) communication underlying cellular networks with multiple cells is analyzed in this paper, where D2D links share the uplink resource of the cellular users. Based on urban macro and indoor hotspot channel model, a ...

research-article
Research on Security Evaluation of Space Used Very Large Scale Integration (VLSI)
Article No.: 5, Pages 1–5https://doi.org/10.1145/3448734.3450457

The hardware security of space VLSI is an important issue of the reliable operation of spacecraft system in orbit. This paper focuses on the security evaluation method of VLSI design front-end based on formal verification theory. This method is adopted ...

research-article
Skeleton model based space image registration method
Article No.: 6, Pages 1–6https://doi.org/10.1145/3448734.3450458

Space target image registration plays an irreplaceable role in space surveillance. Therefore, it is necessary to obtain a clear space target image as a space surveillance precaution data support. This paper studies the camera model and it mainly ...

research-article
Research on modification method of airborne PCM data processing results
Article No.: 7, Pages 1–5https://doi.org/10.1145/3448734.3450459

PCM data is an indispensable part of the data processing in flight test, and the data contains some important parameters. If time jumping or error recording in the PCM data acquisition unit or recorder, the data processing will go wrong, and bring some ...

research-article
Design and Implementation of an Automatic Precipitation Calibration and Verification Device
Article No.: 8, Pages 1–5https://doi.org/10.1145/3448734.3450460

This paper proposes key points of precipitation calibration and verification, and designs an automatic system based on experiment needs. To design an efficient system, this paper investigates precipitation monitor devices and standard calibration and ...

research-article
A Radar and Monocular Camera-based Fusion Approach for Pedestrian Detection
Article No.: 9, Pages 1–7https://doi.org/10.1145/3448734.3450461

Since single sensor has its own shortcomings in pedestrian detection, fusion detection of using radar and camera sensor is currently an effective solution for unmanned driving. This paper proposes a new strategy based on the fusion of radar and camera. ...

research-article
Learning Convolutional Features and Text Information to Draw Image
Article No.: 10, Pages 1–5https://doi.org/10.1145/3448734.3450462

In this paper, a more effective and general joint exploration method (JEM) is proposed to synthesize images. By combining the technology of image segmentation, feature extraction, and image synthesis, high-quality images can be generated based on the ...

research-article
The multi-task learning with an application of Pareto improvement
Article No.: 11, Pages 1–5https://doi.org/10.1145/3448734.3450463

Multi-task learning is a promising field in machine learning, which aims to improve the performance of multiple related learning tasks by taking advantage of useful information between them. Multi-task learning is essentially equivalent to multi-...

research-article
Efficient forward secure searchable encryption supporting multi-keyword query
Article No.: 12, Pages 1–9https://doi.org/10.1145/3448734.3450464

Searchable encryption (SE) allows client to outsource personal data to an untrusted server while protecting the data privacy, which is widely used by corporations and individuals. Recently, many works show that forward privacy is the fundamental ...

research-article
Vibration Normalization Processing for Fault Diagnostics Under Varying Conditions
Article No.: 13, Pages 1–5https://doi.org/10.1145/3448734.3450465

Mechanicel vibration signal under varying conditions shows time-varying characteristics, which results in the incomparability of vibration features that corresponding to different machine states, also increases the difficulties in achieving fault ...

research-article
Research on Design Program of Buffer Valve based on Python
Article No.: 14, Pages 1–6https://doi.org/10.1145/3448734.3450466

Buffering valve is an important component to control clutch oil pressure in vehicle transmission devices. Its structure is various, but different buffering valves have similar structures. In the design of the buffering valve, the similar calculation ...

research-article
A Comprehensive Study on Robust EEG Signal Generation and Evaluation
Article No.: 15, Pages 1–5https://doi.org/10.1145/3448734.3450467
research-article
Research on Key Technology of Access Control Policies Based on Multi-Agent
Article No.: 16, Pages 1–8https://doi.org/10.1145/3448734.3450468

A new access control policy model was proposed, in which the concept of policy security domain was put forward which mean that policies was formulated according to domain. Json language were adopted to all the policies. Consistency of policies was ...

research-article
short-paper
Trend Analysis of Research Direction in Computer Science Based on Microsoft Academic Graph
Article No.: 18, Pages 1–4https://doi.org/10.1145/3448734.3450470

The field of computer science and its derived 34 research directions have developed dynamically and rapidly in recent decades, but the development trend and potential correlation of each research directions have not been well studied. Based on the ...

research-article
Defensive Measure of Audio Secret Communication Based on Beamforming
Article No.: 19, Pages 1–6https://doi.org/10.1145/3448734.3450471

Beamforming is a common processing tool in signal processing to produce energy focused and directional focused signals. In this paper, it used to process acoustic and ultrasonic waves to achieve directional and secure transmission of speech. Automatic ...

research-article
Scalable Video Block Streaming in UDNs Using a Multi-Agent Multi-Armed Bandit Approach
Article No.: 20, Pages 1–5https://doi.org/10.1145/3448734.3450472

At present, the densification of base stations (BSs) enables a user to connect to multiple BSs in ultra-dense networks (UDNs). In this paper, we consider the problem of multi-user scalable video streaming in a UDN, which allows different layers of a ...

research-article
Application of CNN in EEG Image Classification of AD Patients
Article No.: 21, Pages 1–5https://doi.org/10.1145/3448734.3450473

Aiming at the problem that the early symptoms of Alzheimer's disease are not obvious, and it is difficult for non-professionals to judge Alzheimer's disease, this paper designs an automatic method for judging whether Alzheimer's disease is developed ...

research-article
A topic definition model of self-media news based on Louvain algorithm
Article No.: 22, Pages 1–6https://doi.org/10.1145/3448734.3450474

In order to attract readers, most self-media writers contain keywords that reflect the theme of "net celebrity". However, the title keywords often have a certain deviation from the web page topic. In the news recommendation system, this deviation will ...

research-article
Design and implementation of UAV intelligent delivery system for special people serving special areas and periods
Article No.: 23, Pages 1–5https://doi.org/10.1145/3448734.3450475

With the development and application of Internet of things technology, artificial intelligence, UAV and other technologies, logistics and express industry is about to usher in a new upgrade. Mainstream logistics enterprises are carrying out relevant ...

research-article
Research on positioning algorithm of binocular camera based on multi-media
Article No.: 24, Pages 1–7https://doi.org/10.1145/3448734.3450476

With the development of computer technology, image processing technology has become an increasing number of mature. However, the accuracy of target positioning has not reached the expectation in the case of multi-medium. Based on the binocular ...

research-article
The Application of Data Mining Algorithms in the Construction of Travel Recommendation System
Article No.: 25, Pages 1–12https://doi.org/10.1145/3448734.3450477

Photos shared by users of online social network often associated with tags, texts, geographic and time information. These data are ideal research resource which can be used by researchers to observe people's interests and behaviors. They can also be ...

short-paper
Implementation of Trajectory Comparison of Motion Matching in UE4
Article No.: 26, Pages 1–4https://doi.org/10.1145/3448734.3450478

Traditional character animation system is usually implemented by state machine. The system divides animation clips into various states and switches states through various operations. With the diversification of operations, the animation states are ...

research-article
Application of Blockchain in Construction Inspection Activities
Article No.: 27, Pages 1–5https://doi.org/10.1145/3448734.3450479

Construction management is a complex and time-consuming process, and effective quality management is mandatory to ensure overall project quality. Unfortunately, current methods are cumbersome and rife with error. Therefore, the application of electronic ...

research-article
Research on Grid Expansion Planning and Reliability Balance under the Fusion of Energy Storage and Wind Power
Article No.: 28, Pages 1–5https://doi.org/10.1145/3448734.3450480

Based on sequential Monte Carlo method, the reliability evaluation of power systems with energy storage and wind power was carried out. The wind storage system was connected to IEEE-RBTS system for simulation, and the corresponding program was written ...

research-article
Summary of Test Training Network
Article No.: 29, Pages 1–5https://doi.org/10.1145/3448734.3450481

In the process of test and training, the effective acquisition, circulation and distribution of test and training data are mainly completed by the test and training network. This paper briefly introduces the characteristics, development status, ...

research-article
Research on the development trend of vehicle operating system in China
Article No.: 30, Pages 1–6https://doi.org/10.1145/3448734.3450482

The development trend, market application, standards and regulations of vehicle operating system (VOS) technology at home and abroad are studied in this paper. Combined with the definition and classification of VOS, main characteristics of the most ...

Index Terms

  1. The 2nd International Conference on Computing and Data Science
    Index terms have been assigned to the content through auto-classification.

    Recommendations