Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3503047acmotherconferencesBook PagePublication PagesaissConference Proceedingsconference-collections
AISS '21: Proceedings of the 3rd International Conference on Advanced Information Science and System
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
AISS 2021: 2021 3rd International Conference on Advanced Information Science and System Sanya China November 26 - 28, 2021
ISBN:
978-1-4503-8586-2
Published:
19 January 2022

Reflects downloads up to 09 Nov 2024Bibliometrics
Abstract

No abstract available.

research-article
University of Santo Tomas Department of Filipino Virtual Front Desk
Article No.: 1, Pages 1–6https://doi.org/10.1145/3503047.3503048

A virtual help desk was defined as a remote helpdesk that gives support for 24 hours a day, 7 days a week every year. This remote helpdesk would also be available "anytime" and "anywhere" allowing people to be able to resolve issues and questions as ...

research-article
MATYAG: A Tracking System to Prevent Potential Cases of Human Trafficking
Article No.: 2, Pages 1–5https://doi.org/10.1145/3503047.3503049

The developers developed MATYAG: A Tracking System to Prevent Potential Cases of Human Trafficking that will raise awareness and allow citizens to report potential human trafficking cases.

With this, the developers were able to provide a tracking system ...

research-article
Comparison of the proportional hazard model and the accelerated failure model in the mixed cure model
Article No.: 3, Pages 1–6https://doi.org/10.1145/3503047.3503050

Traditional survival analysis models such as the Cox model and the accelerated failure time model (AFT) assume that all individuals will eventually experience specified endpoint events, such as recurrence or death. However, in recent years, with the ...

research-article
Radar Working Mode Recognition Method Based on Complex Network Analysis
Article No.: 4, Pages 1–8https://doi.org/10.1145/3503047.3503051

Aiming at the problem that it is difficult to recognize the working mode of multi-functional radar without prior information, this paper proposes a radar working mode recognition method based on complex network analysis. Use the simulated reconnaissance ...

research-article
Facial Expression Recognition Based on Deep Learning and Attention Mechanism
Article No.: 5, Pages 1–6https://doi.org/10.1145/3503047.3503052

Facial expression recognition has always been a challenging task. With the development of deep learning theory, facial expression recognition has brought new breakthroughs and development trends. This paper proposes a network based on attention ...

research-article
Commercial Aircraft On-Board Loadable Software Distribution and Control Digital Solution
Article No.: 6, Pages 1–5https://doi.org/10.1145/3503047.3503053

Modern commercial aircraft have become more and more software-controlled. The use of physical media to distribute and control on-board loadable software is inefficient and costly. The paper studied the traditional software distribution and control ...

research-article
Few-shot Adversarial Audio Driving Talking Face Generation
Article No.: 7, Pages 1–6https://doi.org/10.1145/3503047.3503054

Talking-face generation is an interesting and challenging problem in computer vision and has become a research focus. This project aims to generate real talking-face video sequences, especially lip synchronization and head motion. In order to create a ...

research-article
HENet: Forcing a Network to Think More for Font Recognition
Article No.: 8, Pages 1–5https://doi.org/10.1145/3503047.3503055

Although lots of progress were made in Text Recognition /OCR in recent years, the task of font recognition is remaining challenging. The main challenge lies in the subtle difference between these similar fonts, which is hard to distinguish. This paper ...

research-article
Immune Optimization Algorithm for Traveling Salesman Problem Based on Clustering Analysis and Self-Circulation
Article No.: 9, Pages 1–7https://doi.org/10.1145/3503047.3503056

In order to improve the population diversity during immune optimization of high-dimensional TSP problem, avoid falling into local optimal solutions, and then improve the algorithm's global optimization capability and optimization efficiency, Immune ...

research-article
A Residual Life Prediction model for Bivariate Degraded Products Based on Copula and Particle Filtering
Article No.: 11, Pages 1–6https://doi.org/10.1145/3503047.3503058

Abstract: Prognostics and health management (PHM) plays a significant role for products in field conditions. An accurate residual life (RL) prediction model is the core technique of PHM. Recently, most publications focus on the data-driven RL prediction ...

research-article
Nonlinear Controller Design for Power System via TS Fuzzy Model
Article No.: 12, Pages 1–4https://doi.org/10.1145/3503047.3503059

With the complexity of network structures and operation conditions, new challenge is brought to power system stability.Conventional linear controllers based on the small signal method were designed via a linearization technique at the equilibrium point,...

research-article
Attention-Based Sub-Word Network for Multilingual Short Text Classification
Article No.: 13, Pages 1–6https://doi.org/10.1145/3503047.3503060

Feature computation of multilingual text is an important semantic processing task in the field of natural language processing (NLP). In the actual production environment, the state-of-the-art models cannot analyze short texts mixed with multi-languages ...

research-article
Citizen adoption of e-justice services: An empirical research in China
Article No.: 14, Pages 1–5https://doi.org/10.1145/3503047.3503061

As part of e-government efforts investing in public service, e-justice plays an important role in creating a fair, transparent, and efficient social environment. However, few publications have explored the factors influencing e-justice adoption. This ...

research-article
Research on the Optimal Methods for Graph Edit Distance
Article No.: 15, Pages 1–7https://doi.org/10.1145/3503047.3503062

Graph edit distance is an important way to measure the similarity of pairwise graphs and has been widely used to bioinformatics, chemistry, social networks, etc. However, the expensive computation of graph edit distance poses serious algorithmic ...

research-article
An Improved GAIL Based on Object Detection, GRU, and Attention
Article No.: 16, Pages 1–8https://doi.org/10.1145/3503047.3503063

Imitation Learning (IL) learns expert behavior without any reinforcement signal. Thus, it is seen as a potential alternative to Reinforcement Learning (RL) in tasks where it is not easy to design reward functions. However, most models based on IL ...

research-article
x4 Super-Resolution Analysis of Magnetic Resonance Imaging based on Generative Adversarial Network without Supervised Images
Article No.: 17, Pages 1–5https://doi.org/10.1145/3503047.3503064

Magnetic resonance imaging (MRI) is widely used in clinical medical auxiliary diagnosis. In acquiring images by MRI machines, patients usually need to be exposed to harmful radiation. The radiation dose can be reduced by reducing the resolution of MRI ...

research-article
Modeling of Sports News Information Dissemination in Social Networks
Article No.: 18, Pages 1–6https://doi.org/10.1145/3503047.3503065

Modeling the process of information dissemination in online social networks is an important task that helps understand the information diffusion mechanism and analyze the influencing factors. However, most of the existing models focus on the diffusion ...

research-article
A Robust and Learning Approach for Multi-Phase Aerial Search with UAVs
Article No.: 19, Pages 1–5https://doi.org/10.1145/3503047.3503067

Unmanned aerial vehicles (UAVs) have been attracting more and more attention in the research and industry field. Aerial search is a common mission and is intrinsically fit for UAVs, e.g. disaster rescue, remote sensing and environmental monitoring. With ...

research-article
Ship Detection Method based on Scale Matched R3Det
Article No.: 20, Pages 1–6https://doi.org/10.1145/3503047.3503068

Given their high detection rates and low false alarm rates, object detection neural networks based on deep learning have been widely used in ship detection. However, the detection in real-world scenario with complex back ground remains a challenge in ...

research-article
A Frequency-first Heuristic for Shortest Linear Programs
Article No.: 21, Pages 1–6https://doi.org/10.1145/3503047.3503069

The shortest linear program has been proved to be a NP-hard problem. In order to obtain the better approximate solution, a frequency-first heuristic method is proposed, which can optimize the number of XOR gates required by linear components while ...

research-article
A Cost-Efficient Platform Design for Distributed UAV Swarm Research
Article No.: 22, Pages 1–6https://doi.org/10.1145/3503047.3503070

Unmanned Aerial Vehicles (UAVs) have been attracting more and more attention in research and education. Specifically, Swarm intelligence is a promising future technology of UAVs and the frontier of multi-agent system research. It has the characteristics ...

research-article
FISC: Furniture image style classification model based on Gram transformation
Article No.: 23, Pages 1–5https://doi.org/10.1145/3503047.3503071

With the development of e-commerce, the types of commodities are becoming more diversified. Classification of commodities based on aesthetic attributes such as style is an important supplement to traditional classification techniques. Aiming at the ...

research-article
Design and realization of small anti-jamming GNSS antenna based on LTCC
Article No.: 24, Pages 1–7https://doi.org/10.1145/3503047.3503072

In order to make the global navigation satellite system (GNSS) have the ability of anti-jamming, it is a feasible scheme to replace the antenna in situ. However, the widely developed anti-jamming antenna is bulky and heavy, which can not meet the needs ...

research-article
Unsupervised Barcode Image Reconstruction Based on Knowledge Distillation
Article No.: 25, Pages 1–6https://doi.org/10.1145/3503047.3503073

Due to the influence of the lighting and the focal length of the camera, the barcode images collected are degraded with low contrast, blur and insufficient resolution, which affects the barcode recognition. To solve the above problems, this paper ...

research-article
Open Access
Survey of Trust Management on Mission-oriented Internet of Things
Article No.: 26, Pages 1–5https://doi.org/10.1145/3503047.3503076

The Internet of Things (IoT) enables us to use diverse sensing data and control IoT devices, sometimes, networks remotely. This technology makes our lives easier and more comfortable. However, the services currently provided by IoT systems are limited ...

research-article
Meta-Model and Tool Support for the Organizational Aspects of Internet-of-Things Development Methods: Organizational Aspects of IoT Development Methods
Article No.: 27, Pages 1–6https://doi.org/10.1145/3503047.3503077

The Internet-of-Things (IoT) has long become reality and contributes to the digital transformation of many industrial domains. IoT technologies are at the core of industry 4.0 application scenarios, contribute to cyber-physical system implementation, ...

research-article
Perspective on Intelligent Sensing System
Article No.: 28, Pages 1–5https://doi.org/10.1145/3503047.3503078

With rapid development of artificial intelligence, cognitive technology and big data technology, intelligent sensing system has attracted extensive attention of researchers at home and abroad. This paper studies the related development status of ...

research-article
A Novel DGA Domain Adversarial Sample Generation Method By Geometric Perturbation
Article No.: 29, Pages 1–10https://doi.org/10.1145/3503047.3503080

Malicious domain names detection is an important technology in network security. Attackers mainly use domain generation algorithms (DGAs) to carry out malicious network attacks. Although DGA domain detection based on deep learning has good performance, ...

research-article
Open Access
Image-based Malware Classification using Deep Convolutional Neural Network and Transfer Learning
Article No.: 30, Pages 1–6https://doi.org/10.1145/3503047.3503081

Malware classification is a major challenge as they have multiple families and its type has been ever increasing. With the involvement of deep learning and the availability of massive data, neural networks can easily address this problem. This ...

Index Terms

  1. Proceedings of the 3rd International Conference on Advanced Information Science and System
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 41 of 95 submissions, 43%
      YearSubmittedAcceptedRate
      AISS '19954143%
      Overall954143%