Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Harvest Palm Tree Based on Detection Through 2D LiDAR Sensor Using Power Equation

    The palm oil industry in Malaysia is encountering challenges that need innovative and technology-driven solutions. This study focuses on palm tree detection where 2D LiDAR sensors are utilized to collect data ...

    Luqman Hakim Bin Yusof in Data Science and Emerging Technologies (2024)

  2. No Access

    Chapter and Conference Paper

    Multimodal Emotion Recognition Using Attention-Based Model with Language, Audio, and Video Modalities

    Multimodal emotion identification is becoming increasingly important in human–computer interaction due to the amount of emotional information in human communication. Multimodal emotion recognition is the techn...

    Disha Sharma, Manoj Jayabalan, Nailya Sultanova in Data Science and Emerging Technologies (2024)

  3. No Access

    Chapter and Conference Paper

    Consumer Behavior Prediction During Covid-19 Pandemic Conditions Using Sentiment Analytics

    Covid-19 pandemic created a global shift in the way how consumers purchase. Restrictions to movements of individuals and commodities created a big challenge on day today life. Due to isolation, social media us...

    Saravanan Murugan, Sulaf Assi, Abbas Alatrany in Data Science and Emerging Technologies (2023)

  4. No Access

    Chapter and Conference Paper

    An Automatic GUI Generation Method Based on Generative Adversarial Network

    As a technique applied with artificial neural networks, deep learning is widely used in the field of image recognition. However, a lack of available datasets leads to imperfect model learning. By analysing the...

    Xulu Yao, Moi Hoon Yap, Yanlong Zhang in Proceedings of Seventh International Congr… (2023)

  5. No Access

    Chapter and Conference Paper

    A Naive but Effective Post-processing Approach for Dark Channel Prior (DCP)

    Dark Channel Prior (DCP) is originally introduced to remove the haze effects from a digital image. Though the effectiveness of the DCP approach on haze removal, the DCP approach often leads the recovered image...

    Danny Ngo Lung Yao, Abdullah Bade in Data Science and Emerging Technologies (2023)

  6. No Access

    Chapter

    Federated Learning for IoT Applications, Attacks and Defense Methods

    Federated Learning (FL) is a distributed Machine Learning (ML) framework, which has been considered as a reliable approach to preserve privacy for the widely used Internet of Things (IoT) applications. Althoug...

    Zhe Qu, Rui Duan, Yao Liu, Zhuo Lu in AI Embedded Assurance for Cyber Systems (2023)

  7. No Access

    Chapter and Conference Paper

    Influence and Optimization of Power Grid ERP System Permission Management on Enterprise Internal Control

    To further explore the impact of ERP (Enterprise Resource Planning, ERP) system authority management on the internal management control of power grid enterprises, further standardize the internal management pr...

    Zhu Zuo**, Zhang Wei, Huang Yao in Proceedings of Eighth International Congre… (2023)

  8. No Access

    Chapter and Conference Paper

    A Computer-Aided Comparative Study on Grammatical Cohesion in Abstracts of Sci-Tech Journal Papers by Chinese and American Scholars

    Cohesion, as one of the important ways to achieve discourse coherence, is a crucial part of discourse analysis. Therefore, employing computer-aided Independent Sample T-Test in SPSS software, this paper explor...

    **uyun Xu, Dandan Yao in The 2021 International Conference on Machi… (2022)

  9. No Access

    Chapter and Conference Paper

    Project Management Mechanism Research of Distribution Network Based on Big Data

    There are many kinds and large quantities of distribution network projects, and the traditional manual control method is inefficient. Power grid construction presents the trend of intellectualization, digitali...

    Wei Song, Lei Xue, Yao Wang, Jiwu Liu in The 2021 International Conference on Machi… (2022)

  10. No Access

    Chapter and Conference Paper

    Multi-scale Convolutional Neural Networks-Based Severity Prediction

    The software defect report is an important part of the software repair process, and its severity attribute is very important. According to the description of the severity attribute of the software defect repor...

    Guangliang Liu, Huaming Liu, Fei Ding in The 2021 International Conference on Machi… (2022)

  11. No Access

    Chapter and Conference Paper

    Influence of RPA Financial Robot on Financial Accounting and Its Countermeasures

    With the continuous reform of digital technology, RPA financial robot emerges as the times require. Based on the automation of financial processing process, financial robot has a great influence on traditional...

    Yao Dong in The 2021 International Conference on Machi… (2022)

  12. No Access

    Chapter and Conference Paper

    Trusted Identity Cross-Domain Dynamic Authorization Mechanism Based on Master-Slave Chain

    In order to solve the security problems existing when power users access power services in different domains, this paper proposes a dynamic authorization model for power users based on master-slave chain. In t...

    **uli Huang, Qian Guo, Qigui Yao in The 10th International Conference on Compu… (2021)

  13. No Access

    Chapter and Conference Paper

    Bit Slotted ALOHA Algorithm Based on a Polling Mechanism

    In this study, we propose a bit slotted ALOHA algorithm based on a polling mechanism (PBSA) to address the tag collision problem of dynamic radio frequency identification (RFID) systems. This algorithm is base...

    Hongwei Deng, Wenli Fu, Ming Yao in The 10th International Conference on Compu… (2021)

  14. No Access

    Chapter and Conference Paper

    IoT Terminal Security Monitoring and Assessment Model Relying on Grey Relational Cluster Analysis

    IoT (Internet of Things) terminal security monitoring and evaluation encompasses technique and administration. There are several uncertainties in the monitoring and assessment process of various types of IoT ...

    Jiaxuan Fei, **angqun Wang, **aojian Zhang in The 10th International Conference on Compu… (2021)

  15. No Access

    Chapter and Conference Paper

    Weighted Slopeone-IBCF Algorithm Based on User Interest Attenuation and Item Clustering

    Aiming at the problem that the traditional collaborative filtering algorithm has low recommendation accuracy and unsatisfactory results when the matrix is sparse, weighted SlopeOne-IBCF algorithm based on user...

    Peng Shi, Wenming Yao in The 10th International Conference on Compu… (2021)

  16. No Access

    Chapter and Conference Paper

    Entropy Enhanced AHP Algorithm for Heterogeneous Communication Access Decision in Power IoT Networks

    In this paper, the importance of the coverage, security, transmission delay, service rate and cost in each heterogeneous wireless network to the power business is comprehensively analyzed from the perspective...

    Yao Wang, Yun Liang, Hui Huang, Chunlong Li in The 10th International Conference on Compu… (2021)