


default search action
DSIT 2022: Shanghai, China
- 5th International Conference on Data Science and Information Technology, DSIT 2022, Shanghai, China, July 22-24, 2022. IEEE 2022, ISBN 978-1-6654-9868-5

- Weiyang Chen, Chuncao Mei:

Research on the evaluation model for fair distribution of space resources in the future. 1-5 - Bo Huang, Yang Liu:

A Network Vulnerability Assessment Method Using General Attack Tree. 1-4 - Yuqi Hu

, Yu Lu:
Optimal Sales Strategies for Electric Vehicles Based on Big Data Analytics. 1-6 - Zhiling Cai, Ruijia Li, Hong Wu:

Truncated representation graph with adaptive weighted and manifold regularization for agglomerative clustering. 1-6 - Hong Jia, Yubin Weng:

Unsupervised Feature Selection via Adaptive Feature Clustering for High-dimensional Data. 1-6 - Enpei Zhang, Kai Han, Benwei Wu:

An Algorithmic View of Streaming Submodular Data Summarization with A Knapsack Constraint. 1-6 - Nana Niu:

Research on the development status of social organization standardization based on big data analysis. 1-5 - Donglin Ren, Jun Tu, Wei Xie, Changyin Wu:

An Optimized Raft Protocol Combined with Redundant Residue Number System. 1-6 - Xuan Li:

An Effective and Efficient Face Mask Recognition System for Edge Devices. 1-5 - Qi Ding, Qingjuan Wang, Liangfeng Jin, Ran Shen:

A Novel Performance Evaluation Strategy of Automatic Machine Learning on Electricity Services. 1-5 - Lv Yangcai, Zhiyun Chen:

Course-oriented Knowledge State Model. 1-6 - Hong Jia, Weiwei Zhong:

Clustering Algorithm with Learnable Distance for Categorical Data with Nominal and Ordinal Attributes. 1-5 - Xianfeng Wang, Xiaobo Liu, Guoping Ding, Xiaoyu Yan, Hao Cao:

Damage localization in holed Carbon Fiber composite laminates using FBG sensors based on Back-Propagation Neural Network. 1-8 - Xinchi Li, Mingchuan Yang, Xiaoqing Xia, Kaicheng Zhang, Kang Liu:

A Distributed Data Fabric Architecture based on Metadate Knowledge Graph. 1-7 - Wesam Fadheel, Wassnaa Al-Mawee

, Steve Carr:
On Phishing: URL Lexical and Network Traffic Features Analysis and Knowledge Extraction using Machine Learning Algorithms (A Comparison Study). 1-7 - Yang Wang, Shenggang Jiang, Zhao Zeng, Hanyue Xiong, Qiubao Fang, Yazhuo Li:

Distributed subway station safety detection system based on Raspberry Pi. 1-5 - Wenqi Zhang, Yongchao Gao, Heng Qian, Hongli Lyu:

A Multi-Layer Attention Network for Visual Commonsense Reasoning. 1-6 - Kaiwen Guo, Jinggui Gao, Mingquan Yu:

Numerical optimal investment strategy for DC pension with time delay. 1-7 - Huifang Feng, Xiaofang Zhang, Youji Xu:

Multi-step Ahead Prediction of Traffic Speed Based on Attention-based CNN-LSTM-BiLSTM. 1-6 - Wujie Sun, Qi Chen, Can Wang, Deshi Ye, Chun Chen:

Source-Free Unsupervised Domain Adaptation in Imbalanced Datasets. 1-6 - Wei Liu, Jingdong Sun:

General Forgery Face Detection: Against Generative Adversarial Networks Using Knowledge Distillation. 1-5 - Fengmin An, Bingbing Zhang, Zhenwei Wang, Wei Dong, Jianxin Zhang:

Group RandAugment: Video Augmentation for Action Recognition. 1-5 - Xiwen Zhang, Yanxuan Xu, Hang Xu, Nan Li, Miaohui Li, Zanzhou Bai, Bing Chen, Jie Yang, Yu Qiao:

Probability Based Bone Marrow Cell Detection. 1-6 - Wang Peng, Yin Lei, Junyi Zhou:

Research on missing data filling method of wind power generation based on k-nearest neighbor algorithm. 1-7 - Xianhao Dou, Hao Wang, Pengda Zhang, Kaiyan Tian:

A Parameter Correction Algorithm for Sea Surface with Foam Based on Jason-2 Radar Altimeter. 1-7 - Lijun Liu:

The Implementation of Video Cipher Engine in FPGA. 1-6 - Jianqing Huang, Qi Yuan, Debing Liu, Hailing Fu:

An Image segmentation method for Banana Leaf Disease image with complex background. 1-5 - Yuting Lyu:

Dockerized Knowledge-Oriented Multi-modal Social Event Detection System. 1-6 - Yuan Ao, Yuchen Jiang:

Manufacturing Data Privacy Protection System for Secure Predictive Maintenance. 1-5 - Zhiwei Hu, Tinghan Yang, Jieling Wu, Jingyang Xu, Jiecong Lin, Fulian Yin:

Modeling and Quantifying the Role of User Active Search in COVID-19 Multi-Information Analysis and Prediction in the Chinese Sina-microblog*. 1-7 - Quan Qiu, Ran Li, Bingquan Chen, Ning Hu:

Research on the construction and application of knowledge graph for process quality optimization. 1-6 - Shizhao Li, Quanli Liu, Wei Wang:

Generalized Sidelobe Canceller with Variable Step-Size Least Mean Square Algorithm Controlled by Signal-to-Noise Ratio. 1-6 - Tingting Lv, Yanbo Shao:

Dynamic Risk Assessment of Port Investment in Countries along the Belt and Road. 1-8 - Lilei Wu

, Jie Liu:
Contrastive Learning with Latent Augmentation. 1-8 - Lei Huang

, Feng Zhu, Zhiheng Li:
Trendformer: Trend Adaptive Transformer for Traffic Flow Prediction. 1-6 - Gang Chen, Huijian Liang, Yi Jin, Su Jun Wang, Yifan Ping, Tianjiao Xie, Changzhi Xu, Ying Zhao Shao:

Co-channel Interference Suppression Method based on Multi-beamform Processing in Passive Bistatic Radar. 1-5 - Hui Zhao

, Debing Ni
:
Analysis of firm's pricing strategy with online reviews based on signaling game model. 1-6 - Yuting Huang, Xiangyang Feng, Ming Zhu:

Research on Patent Technology Value Evaluation Method Based on Knowledge Graph. 1-7 - Zanzhou Bai, Ning Luo, Yu Qiao:

Vision-based Toothbrush Quality Evaluation. 1-6 - Guowen Wu

, Zhenwei Li, Yizhou Shen, Hong Zhang, Shigen Shen
, Shui Yu
:
A Deep Reinforcement Learning Approach to Edge-based IDS Packets Sampling. 1-6 - Lili Cheng, Pengbo Xiao, Xinjian Zhang, Yanqi Liu, Lisha Gao, Pan Zhou:

Research on DDoS detection method based on super logarithm and SVM algorithm. 1-8 - Li-li Guo:

Research On Production Effectiveness Evaluation Of Postage Stamps Information System Based On Fuzzy Analytic Hierarchy Process. 1-5 - Xuran Ge, Yang Liu, Lizhou Wu, Yang Ou, Zhiguang Chen, Nong Xiao:

PM-based Persistent Key Value Stores: a Survey. 1-7 - Pan Li, Wenbing Chang, Shenghan Zhou, Yiyong Xiao, Chaofan Wei, Runze Zhao:

A conflict opinion recognition method based on graph neural network in Aspect-based Sentiment Analysis. 1-6 - Yiling Yuan, Shaochen Yao, Xuan Ren, Yao Xiao, Zhongyu Zhou, Yanfeng Lu:

Chest X-ray disease diagnosis method based on YOLO model and pseudo color conversion. 1-5 - Ming Zhu, Nan Jiang, Xiangyang Feng, Shunguang Zhan:

Style Analysis of Clothing From Fashion Shows Based on Deep Learning. 1-6 - Qingtian Zeng, Sai Chang, Shansong Wang, Weijian Ni:

Multi-scale Adaptive Learning Network with Double Connection Mechanism for Super-resolution on Agricultural Pest Images. 1-6 - Juanru Zhao

, Mei Yuan, Jin Cui, Shaopeng Dong, Yufeng Qu, Ben Xu:
A Small-sample Intelligent Fault Diagnosis Method Based on Deep Transfer Learning. 1-6 - Carlo H. Godoy Jr., Nicole Jehru R. Diego, Russel E. Tagumasi, Jordan C. Lerit, Jefferson A. Costales

:
Cybersecurity Scientometric Analysis: Mapping of Scientific Articles using Scopus API for Data Mining and Webscrapping. 1-6 - Jingya Liu, Xiaomin Hu, Qiao Zhong:

Exploring Airbnb Users' Concerns with LDA-based Topic Model and Sentiment Analysis. 1-5 - Fei Cai, Zhiqiang Pan:

Co-Attentive Graph Learning for Session-based Recommendation. 1-5 - J. Serra, R. Quezada, Stacy Fortes, Neil Tellez, Abdulhameed Alelaiwi, E. Landaverde, Yulia Kumar

, J. Jenny Li, Patricia Morreale:
Validation of AI models for ITCZ Detection from Climate Data. 1-7 - Sadeq Darrab, David Broneske, Gunter Saake:

UCRP-miner: Mining Patterns that Matter. 1-7 - Rui Wang, Songhao Wang:

Tensor Voting Based Similarity Matching of Wafer Bin Maps in Semiconductor Manufacturing. 1-6 - Dongting Xu, Zhisheng Zhang, Jinfei Shi:

A Data Quality Assessment and Control Method in Multiple Products Manufacturing Process. 1-5 - Haixu Wang, Shiyong Shao:

Prediction of PM2.5 in Hefei Based on a Hybrid CNN-GRU Model. 1-6 - Changyi He, Jingbo Ma, Chuan Jin:

Xiezhi: An Intelligent Judical Trial System. 1-5 - Zhuchenyang Liu:

User Adoption Analysis of Social Media Applications Based on NLP and Technology Acceptance Model - A Case Study of Facebook. 1-6 - Mingxuan Liu

, Jianhua Gu:
uCleaner: An Efficient Adaptive Garbage Collection Mechanism for KV-Separated LSM-Stores. 1-6 - Yuanfeng Song, Shu Huan Fan, Jiaxin Xu, Jianming Liao:

A Novel Hot-cold Data Identification Mechanism Based on Multidimensional Data. 1-5 - Min Xiao, Zeyu Li, Zheng Sun, Xunzi Liu:

Prediction of College Students' Physical Test Effect Based on BP Neural Network *. 1-7 - Xue-fang Zhang, Yi-ran Cheng:

Multi-dimensional characteristics and governance strategies of rumors about the COVID-19 pandemic. 1-6 - Ruiqi Dong, Jiahui Wu, Zhendong Xi, Guoyi Yan:

Explore the process conditions for the production of C4 olefins by the coupling of ethanol. 1-6 - Chaoqun Wang, Yuhan Dong, Kai Zhang:

Long- and Short-term Preference Learning with Enhanced Spatial Transformer for Next POI Recommendation. 1-6 - Guoan Wang, Xingjun Wang:

Cold-Start Sequential Recommendation with Collaborative Boosted Meta Transitional Learning. 1-5 - Liping Yang, Jun Wu, Xiaxia Niu, Li Shi:

Towards purchase prediction: a voting-based method leveraging transactional information. 1-5 - Yong Li, Chen Mu, Zaojian Dai, Lu Chen:

Security situation awareness method of power mobile application based on big data architecture. 1-6 - Yuxin Zhou, Ruoxuan Yang, Chengcheng Zhu:

Executive compensation and corporate environmental violations: An empirical analysis based on big data of Chinese listed companies. 1-6 - Yue Zhang, Dong Zhang, Feng Guo, Xiaotong Wang, Yihai Duan, Xiaonan Zhang:

Log Anomaly Detection Based on Bi-LSTM Feature Extraction. 1-6 - Jia Ying Ou, Uyen Trang Nguyen, Tayzoon Ismail:

COVMIS: A Dataset for Research on COVID-19 Misinformation. 1-11 - Baili Huang, Zhiheng Li:

Spatiotemporal Indexing and Query Application on Cassandra for Large-Scale Trajectory Data. 1-6 - Thukaraka Pakeerathan, Thenusan Santhirakumar, Dilani Rajendren, Amal Shegan Perera, Su Nguyen

:
Driving Behaviour Analysis using Low Sampling GPS Trajectories of Ride-hailing Services. 1-9 - ShengZeng Li, Yiwen Zhong, Jiaxian Lin, ZhenChang Zhang:

WTCGRU: Short-term wind speed prediction based on window feature importance sampling. 1-5 - Quanyi Hao:

Research on the Duration of Terrorist Organizations, Based on Survival Analysis. 1-6 - Bo Yuan, Jiahui Peng, Chunpei Li, Wangjie Qiu:

PPIRB: Achieving an privacy-preserving image retrieval scheme Based on Blockchain. 1-6 - Xin Wang, Gaomin Xiong, Jun Gao:

Combining Focus Cues and Depth Cues for Light Field Salient Object Detection. 1-7 - Ruohan Gao:

Determining critical lung cancer subtypes from gigapixel multi-scale whole slide H&E stains images. 1-10 - Shiding Hong, Chaokui Qin, Haifeng Dai, Xin Lai

:
SOC estimation of lithium-ion batteries based on the condition of vessels. 1-7 - Chaofei Song, Runfeng Chang, Zibo Zhang

, Anying Liu, Ruowen Li, Shenghan Zhou:
A Short-term Traffic Supply-Demand Gap Prediction Model with Integrated GCN-LSTM Method for Online Car-hailing Services. 1-7 - Xuhui Liu, Yan Xu, Yali Che, Jie Tang:

Super-resolution reconstruction of remote sensing images based on convolutional neural networks. 1-5 - Soravit Wetprasit, Qi Cao

, Chee Kiat Seow:
Recommender System for Coupon Discount of E-commerce Applications. 1-6 - Junwei Zhou, Yijia Qian:

AugLog: System Log Anomaly Detection Based on Contrastive Learning and Data Augmentation. 1-7 - Guozhu Yan, Qiongyu Wu, Rongbing Chen, Linfeng Du, Shuangyin Ren:

A Literature Review of Resiliency Technologies in Military Software Defined Networks. 1-7 - Yuan Zhongjie, Shengwei Wang, Wang Ze:

Air quality prediction method based on the CS-LSTM. 1-5 - Jian Zhou, Yu-Feng Liu, Hong-Liang Sun:

A Reputation Ranking Method based on Rating Patterns and Rating Deviation. 1-6 - Yuqing Lan, Yuxuan Wang:

An inter-partition communication mechanism in multi-domain isolation operating system. 1-6 - Yichiet Aun, Yen-Min Jasmina Khaw, Ming-Lee Gan, Debra Lee Hooi Chern:

A Machine-Learning Ensemble Method for Temporal-aware Sales Forecasting. 1-7 - Wen Su, Qingna Li

:
An Efficient Method for Sample Adversarial Perturbations against Nonlinear Support Vector Machines. 1-8 - Zhe Yan, Canghong Shi, Xiaojie Li, Baolei Xu:

CAM-Guided Spatially Denormalization for Lesion Weakly-Supervised Localization. 1-6 - Zhen Li, Yaru Qian, Qingna Li

:
A Unified Framework and a Case Study for Hyperparameter Selection in Machine Learning via Bilevel Optimization. 1-8 - Haoming Zhang, Yiping Yao, Wenjie Tang, Jiefan Zhu:

A Hegselmann-Krause Model with Social Influence-aware Bounded Confidence Threshold in Social Networks. 1-5 - Zhiming Huang, Qian Weng, Jiawen Lin, Cairen Jian:

Lightweight High-Resolution Remote Sensing Scene Classification via Adaptive Enhanced Knowledge Distillation. 1-6 - Lixiao Sun, Zitong Li, Lei Xie, Mai Ye, Bing Chen:

APTKG: Constructing Threat Intelligence Knowledge Graph from Open-Source APT Reports Based on Deep Learning. 1-6 - Yuan Wang, Liping Yang, Jun Wu, Li Shi:

Mining Multi-source Campus Data: An Empirical Analysis of Student Portrait using Clustering Method. 1-6 - Zanzhou Bai, Zihao Li, Xingqi Fang, Yueyang Gu, Jiyue Sun, Suwei Ma, Xiwen Zhang, Hang Xu, Yu Qiao:

Training Efficient Siamese Network with Probability Label for Object Tracking. 1-6 - Yubing Zhang, Xiangqiang Zeng, Min-si Ao, Wenping Jin:

Spatio-temporal trajectory big data analysis based on HNCORS. 1-7 - Kaidi Gao, Zhiduan Cai, Zuxin Li, Aigang Zeng, Dongming Jiang, Jingyun Xu:

Comparison of data Preprocessing Methods for Support Vector Regression based Remaining Useful Life Prediction. 1-5 - Hau Zheng, Tony Chen:

Examining the Interplay Between Social Media Usage, Happiness, and Academic Performance with Data Science. 1-6 - Jiali Wei:

A Bert-based Joint Model of Intent Recognition and Slot Filling Cross-correlation. 1-5 - Yuhang Fan, Xiaoxia Wang, Miao Chen, Yue Zhu, Pengjing Xu:

Research on university ranking based on literature big data and industry thesaurus - Taking double first-class universities as an example. 1-6 - Gerrit Schumann, Katharina Meyer, Jorge Marx Gómez:

Query-Based Retrieval of German Regulatory Documents for Internal Auditing Purposes. 1-10 - Qing Shi, Zhuchenyang Liu:

Research of User Experience of Video-sharing Apps Based on LDA Method - A Case Study of TikTok. 1-5 - Ziniu Yu, Junliang Wu, William Zhu:

Bipartite Graph based Spectral Clustering with Comprehensive Structure Information Learning. 1-7 - Changde Hu, Qiang Liu, Ziyang Li, Zhenyu Lu, Xu Chu, Xin Wen:

Research on Multi-parameter Tracking Effect Evaluation system Based on Photoelectric theodolite. 1-5 - Yan Ma, Fang Meng:

Enhanced Video Caption Model Based on Text Attention Mechanism. 1-7 - Jiahao Zhang, Xinghua Qian, Peng Liu:

A Link Prediction Model Based on Improved TuckER Decomposition and Neural Tensor Network. 1-5 - Yuteng Liu, Bo Wu, Xiaoyu Qin, Chunyu Wen

:
A decision model based on regression algorithm for gold and Bitcoin in financial market. 1-6 - Wency Suo:

Efficient Music Genre Classification with Deep Convolutional Neural Networks. 1-5 - Hangyan Yu

:
The mediating effect of students' perceived teacher unfairness on the gender differences in science performance: Evidence from multilevel analysis on 31 OECD countries. 1-5 - Xiaobin Li, Chunli Xie, Shuqin Wang, Xiehua Zhang:

Programming Course Student Performance Prediction based on Feature Construction. 1-6 - Rui Zhang, Zi-Yang Wang, Yu Liu:

Using EEG Nonlinear Dynamic Features and Machine Learning to Identify Different Organizational Commitment. 1-7 - Xiao Han, Enmei Tu, Jie Yang:

Multimodal 12-lead ECG data classification using multi-label DenseNet for heart disease detection. 1-6 - Yanyu Zeng, Zhihua Li:

Research on online course classification management under the background of intelligent education. 1-5 - Fatma Ayed Alqahtani, Abdulaziz Almaleh:

Analysis and Prediction of Employee Promotions Using Machine Learning. 1-9 - Pengnian Wu, Zihao Wang, Zhiwei Zhang, Guangpeng Hu, Wenying Dou, Jiangbin Zheng

:
UAV swarm regular geometric formation transformation and interactive control algorithm. 1-9 - Fang Liu, Xiao Li, ShiLei Li, GuoQiuchen Zhang, Qian Zhang, Qiang Xia:

Research on Multi-Index Comprehensive Recognition of Urban Black and Odorous Water Based on GF Satellite Image. 1-6 - Shouwei Li

, Zongjun You:
Research on information retrieval algorithm based on big data block and attribute matrix reasoning. 1-6 - Yangguang Zhang, Qi Chen, Ji Shen, Qihao Shi, Can Wang:

Adaptive Seed Minimization for Diversified Influence Maximization. 1-8 - Shuaiyu Zhang, Yinan Zhang, Zhiyuan Zhang:

Research On Portfolios Optimization Based On Big Data Analysis. 1-5 - Zihao Li

, Zanzhou Bai, Yifu Chen, Xiwen Zhang, Yi Gu, Yu Qiao:
Robust Bounding Box Refinement for Accurate Road Surface Defect Detection. 1-6 - Zhenfeng Li, Kefeng Mao, Pengbo Zhu, Wei Huang, Yufeng Tuo:

Jumpiness Correction for Station Numerical Weather Prediction Using Machine Learning Algorithm. 1-5 - Yimeng Wang, Keyue Yan

:
Prediction of Significant Bitcoin Price Changes Based on Deep Learning. 1-5 - Peng Li, Xinjie Su, Wenya Wu, Xinru Zhu, Huiming Xing:

Research on Different Weights of Single-Valued Neutrosophic Sets in Recommendation System. 1-6 - Meng Zhao, Liang Yang, Zixin Xu, Liangqiang Li, Yunzhong Cao:

Policy research on digital village construction in china: Content characteristics and evolutionary logic. 1-6 - Zhao Xiu-Ying, Wei Jing-Yuan, Zhang Zhi-Qiang, Jiang Ruo-Chong:

Research on Flight Quality based on MRI. 1-6 - Xin Liu, Pengbo Zhu, Zhenfeng Li, Wenguang Fan, Xiaolong Li:

Performance Evaluation of Suspension Control System Based on Minimum Variance. 1-5 - Jie Zheng, Jiakang Hou, Yunchen Tian, Zhenzhong Li, Zhenlong Sun:

Growth model of Cynoglossus semilaevis based on improved parallel BP neural network. 1-8 - Qiejun Dai, Zeyong Mao, Yong Wu, Rui Yao, Jingshi Chen, Lei Chen:

Intelligent Quality Inspection of Secondary Wiring based on Rotating Object Detection and Pairwise Matching Strategy. 1-5 - Xin Luo, Fei Cai, Li Wan, Youqun Shi:

Clothing Flexible Retrieval Based on Attention Mechanism. 1-7 - Mingquan Yu, Jinggui Gao, Kaiwen Guo:

An optimal investment strategy of defined-contribution pension plan with return of premiums. 1-9 - Yi Jing, Zhenyu Liu, Jing Gao, Tao Li:

A Causality Network Construction Method for High Dimensional Time Series Big Data. 1-10 - Mei Wang, Ruihua Li, Ye Li:

Prediction of Disease Progress Using Medical Visit Records with Irregular Time Intervals. 1-6 - Jinyin Chen, Tianle Yu, Changan Wu, Haibin Zheng, Wenhong Zhao, Ling Pang, Hu Li:

Adversarial Attack Detection Based on Example Semantics and Model Activation Features. 1-6 - Xuetong Chen, Minghua Zhang, Zhang Sheng, Chen Guangxi:

RGIS.Online: Geophysical Data Processing and Integrated Analysis Platform in Cloud Mode. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














