No abstract available.
Proceeding Downloads
University of Santo Tomas Department of Filipino Virtual Front Desk
A virtual help desk was defined as a remote helpdesk that gives support for 24 hours a day, 7 days a week every year. This remote helpdesk would also be available "anytime" and "anywhere" allowing people to be able to resolve issues and questions as ...
MATYAG: A Tracking System to Prevent Potential Cases of Human Trafficking
- Mylene J. Domingo,
- John Christian B. Fudotan,
- Alexandria Therese R. Sadang,
- Allyssa Bea R. Topacio,
- Jeremie Jun C. Viray
The developers developed MATYAG: A Tracking System to Prevent Potential Cases of Human Trafficking that will raise awareness and allow citizens to report potential human trafficking cases.
With this, the developers were able to provide a tracking system ...
Comparison of the proportional hazard model and the accelerated failure model in the mixed cure model
Traditional survival analysis models such as the Cox model and the accelerated failure time model (AFT) assume that all individuals will eventually experience specified endpoint events, such as recurrence or death. However, in recent years, with the ...
Radar Working Mode Recognition Method Based on Complex Network Analysis
Aiming at the problem that it is difficult to recognize the working mode of multi-functional radar without prior information, this paper proposes a radar working mode recognition method based on complex network analysis. Use the simulated reconnaissance ...
Facial Expression Recognition Based on Deep Learning and Attention Mechanism
Facial expression recognition has always been a challenging task. With the development of deep learning theory, facial expression recognition has brought new breakthroughs and development trends. This paper proposes a network based on attention ...
Commercial Aircraft On-Board Loadable Software Distribution and Control Digital Solution
Modern commercial aircraft have become more and more software-controlled. The use of physical media to distribute and control on-board loadable software is inefficient and costly. The paper studied the traditional software distribution and control ...
Few-shot Adversarial Audio Driving Talking Face Generation
Talking-face generation is an interesting and challenging problem in computer vision and has become a research focus. This project aims to generate real talking-face video sequences, especially lip synchronization and head motion. In order to create a ...
HENet: Forcing a Network to Think More for Font Recognition
Although lots of progress were made in Text Recognition /OCR in recent years, the task of font recognition is remaining challenging. The main challenge lies in the subtle difference between these similar fonts, which is hard to distinguish. This paper ...
Immune Optimization Algorithm for Traveling Salesman Problem Based on Clustering Analysis and Self-Circulation
In order to improve the population diversity during immune optimization of high-dimensional TSP problem, avoid falling into local optimal solutions, and then improve the algorithm's global optimization capability and optimization efficiency, Immune ...
A Residual Life Prediction model for Bivariate Degraded Products Based on Copula and Particle Filtering
Abstract: Prognostics and health management (PHM) plays a significant role for products in field conditions. An accurate residual life (RL) prediction model is the core technique of PHM. Recently, most publications focus on the data-driven RL prediction ...
Nonlinear Controller Design for Power System via TS Fuzzy Model
With the complexity of network structures and operation conditions, new challenge is brought to power system stability.Conventional linear controllers based on the small signal method were designed via a linearization technique at the equilibrium point,...
Attention-Based Sub-Word Network for Multilingual Short Text Classification
Feature computation of multilingual text is an important semantic processing task in the field of natural language processing (NLP). In the actual production environment, the state-of-the-art models cannot analyze short texts mixed with multi-languages ...
Citizen adoption of e-justice services: An empirical research in China
As part of e-government efforts investing in public service, e-justice plays an important role in creating a fair, transparent, and efficient social environment. However, few publications have explored the factors influencing e-justice adoption. This ...
Research on the Optimal Methods for Graph Edit Distance
Graph edit distance is an important way to measure the similarity of pairwise graphs and has been widely used to bioinformatics, chemistry, social networks, etc. However, the expensive computation of graph edit distance poses serious algorithmic ...
An Improved GAIL Based on Object Detection, GRU, and Attention
Imitation Learning (IL) learns expert behavior without any reinforcement signal. Thus, it is seen as a potential alternative to Reinforcement Learning (RL) in tasks where it is not easy to design reward functions. However, most models based on IL ...
x4 Super-Resolution Analysis of Magnetic Resonance Imaging based on Generative Adversarial Network without Supervised Images
Magnetic resonance imaging (MRI) is widely used in clinical medical auxiliary diagnosis. In acquiring images by MRI machines, patients usually need to be exposed to harmful radiation. The radiation dose can be reduced by reducing the resolution of MRI ...
Modeling of Sports News Information Dissemination in Social Networks
Modeling the process of information dissemination in online social networks is an important task that helps understand the information diffusion mechanism and analyze the influencing factors. However, most of the existing models focus on the diffusion ...
A Robust and Learning Approach for Multi-Phase Aerial Search with UAVs
Unmanned aerial vehicles (UAVs) have been attracting more and more attention in the research and industry field. Aerial search is a common mission and is intrinsically fit for UAVs, e.g. disaster rescue, remote sensing and environmental monitoring. With ...
Ship Detection Method based on Scale Matched R3Det
Given their high detection rates and low false alarm rates, object detection neural networks based on deep learning have been widely used in ship detection. However, the detection in real-world scenario with complex back ground remains a challenge in ...
A Frequency-first Heuristic for Shortest Linear Programs
The shortest linear program has been proved to be a NP-hard problem. In order to obtain the better approximate solution, a frequency-first heuristic method is proposed, which can optimize the number of XOR gates required by linear components while ...
A Cost-Efficient Platform Design for Distributed UAV Swarm Research
Unmanned Aerial Vehicles (UAVs) have been attracting more and more attention in research and education. Specifically, Swarm intelligence is a promising future technology of UAVs and the frontier of multi-agent system research. It has the characteristics ...
FISC: Furniture image style classification model based on Gram transformation
With the development of e-commerce, the types of commodities are becoming more diversified. Classification of commodities based on aesthetic attributes such as style is an important supplement to traditional classification techniques. Aiming at the ...
Design and realization of small anti-jamming GNSS antenna based on LTCC
In order to make the global navigation satellite system (GNSS) have the ability of anti-jamming, it is a feasible scheme to replace the antenna in situ. However, the widely developed anti-jamming antenna is bulky and heavy, which can not meet the needs ...
Unsupervised Barcode Image Reconstruction Based on Knowledge Distillation
Due to the influence of the lighting and the focal length of the camera, the barcode images collected are degraded with low contrast, blur and insufficient resolution, which affects the barcode recognition. To solve the above problems, this paper ...
Survey of Trust Management on Mission-oriented Internet of Things
The Internet of Things (IoT) enables us to use diverse sensing data and control IoT devices, sometimes, networks remotely. This technology makes our lives easier and more comfortable. However, the services currently provided by IoT systems are limited ...
Meta-Model and Tool Support for the Organizational Aspects of Internet-of-Things Development Methods: Organizational Aspects of IoT Development Methods
The Internet-of-Things (IoT) has long become reality and contributes to the digital transformation of many industrial domains. IoT technologies are at the core of industry 4.0 application scenarios, contribute to cyber-physical system implementation, ...
Perspective on Intelligent Sensing System
With rapid development of artificial intelligence, cognitive technology and big data technology, intelligent sensing system has attracted extensive attention of researchers at home and abroad. This paper studies the related development status of ...
A Novel DGA Domain Adversarial Sample Generation Method By Geometric Perturbation
Malicious domain names detection is an important technology in network security. Attackers mainly use domain generation algorithms (DGAs) to carry out malicious network attacks. Although DGA domain detection based on deep learning has good performance, ...
Image-based Malware Classification using Deep Convolutional Neural Network and Transfer Learning
Malware classification is a major challenge as they have multiple families and its type has been ever increasing. With the involvement of deep learning and the availability of massive data, neural networks can easily address this problem. This ...
Index Terms
- Proceedings of the 3rd International Conference on Advanced Information Science and System
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
AISS '19 | 95 | 41 | 43% |
Overall | 95 | 41 | 43% |