Program Booklet
Here is the program booklet guidance
Conference Schedule
9.28 AM
9:00 ~ 9:30 The opening ceremony
9:30 ~ 9:40 A group photo
9:40 ~ 10:10 Keynote Speaker1 : Large-scale Clinical Trial Text Mining through Natural Language Processing
10:10 ~ 10:25 Tea break
10:25 ~ 10:55 Keynote Speaker2 : Constructing intelligent interactive maps of cultural and historical information
10:55 ~ 11:25 Keynote Speaker3
9.28 PM
Room 1002-1
Time | Content | ||
---|---|---|---|
session 1 | 13:00-13:10 | Quantitative Analysis of the Factors Influencing Macao's Tourism Industry: A Gray Correlation Approach | Dan Luo and Xia Liu |
13:10-13:20 | Multi-AUV Hunting Strategy Based on the Lions Group Algorithm | Ziying Zhang and Jie Wang | |
13:20-13:30 | Study on the Coupled and Coordinated Relationships between Social Security and Economic and Social Development in Macao | Yinan Chen and Xia Liu | |
13:30-13:40 | A Segmentation Network for Coastal Cegetation Guided by Category-Wighted Information from UAV Perspective Based on SAM | Liang Qu,Xiaoli Song,Kelei Yuan,Zhen Liu,Shize Shao,Jiehong Sun,Guanghao Yuan,Jianing Sun and Wenxin Jiang | |
13:40-13:50 | GAN-Based Defogging and Multiscale Fusion Approach for UAV-Based Seagrass Bed Imagery Semantic segmentation in challenging marine environments | Liang Qu,Mengmeng Zhang,Juan Wang, Ruobing Wen and Shengke Wang | |
13:50-14:00 | SEBWatcher: Visual Analysis System for Subject, Environment and Behavior in Traffic Scenes | Zhiyuan Wu, Junxiang Cao, Xuefei Tian and Xiaoju Dong | |
14:00-14:10 | Research on the Promotion and Enhancement Paths of Hainan Wenbifeng Pangu Cultural Tourist Areas Based on Network Text Analysis | Wen Zhao and Xulun Huo | |
14:10-14:20 | Based on Network Text Analysis: A Study on the Promotion Strategy of a Boundary Island for Lingshui Tourism Experience | Wen Zhao and Zejiang Wei | |
14:20-14:30 | Deep Reinforcement Learning Based on Greed for the Critical Cross section Identification Problem | Huaiyuan Liu, Donghua Yang, Hekai Huang, Xinglei Chen, Hongzhi Wang, Yong Cui and Jun Gu | |
14:30-14:40 | Intrusion Detection Based on Feature Selection and Transformer BiGRU | Weidong Zeng, Hongshan Yang and Yong Wang | |
14:40-14:50 | Discussion on the construction of power 3D design platform for nested virtualized hybrid cloud | Yi Liu and Sheng Cao | |
session 2 | |||
14:50-15:00 | Leveraging Spatial Characteristics in Trajectory Compression: An Angle-based Bounded-error Method | Yongcheng Liu, Xue Ouyang, Huan Zhou, Weichen Peng, Jieming Mao and Yongke Pan | |
15:00-15:10 | HENF: Hierarchical Entity Neighbor Multi-Relational Fusion Network for Knowledge Graph Completion | Yukun Cao, Kangle Xu, Yu Cheng, Jialuo Yan and Zhenyi He | |
15:10-15:20 | TCB Intrusion Detection Method Based on Data Enhancement | Yunlong YE, Lin Zhou, Xiaobo Hu and Yong Wang | |
15:20-15:30 | Multi-source Heterogeneous Data Joint Diagnosis Method for Transformers Based on D-S Evidence Theory | Yaxing Qiao, Runping He, Zhangyu Chen, Jingwen Ni, Zhigang Xie and Zhefei Wang | |
15:30-15:40 | Progressive Federated Learning Scheme Based on Model Pruning | Xinsheng Li, Chaochao Sun, Yuan Peng and Ting Zhang | |
15:40-15:50 | Privacy Protection Data Aggregation Scheme Against Quantum Attacks | Gang Li | |
15:50-16:00 | LOCATION DATA QUADTREE PARTITIONINGALGORITHM BASED ON DIFFERENTIAL PRIVACY | Guanhao Chen and Jinguo Li | |
16:00-16:10 | RLART: An Adaptive Radix Tree Based on Deep Reinforcement Learning | Mengkun Zhang,Lingli Li and Xin Zheng | |
16:10-16:20 | Android malware detection method based on machine learning | Xiong Wan, Yuxi Sun, Yanqing Wang and Meng Xia | |
16:20-16:30 | A lightweight edge network intrusion detection system based on MobileVit | Xiaobo Yang, Xiaobo Hu, Chao Li, Lin Zhou and Yong Wang | |
16:30-16:40 | TRAFFICNET: A NOVEL NETWORK PERFORMANCE PREDICTION MODEL VIA AGGREGATOR-BASED ENHANCEMENT | Ming Li and Haizhou Du | |
16:40-16:50 | Active optimization routing protocol based on SDVN⋆ | Chen Yufeng, Zhou Xu, Weng Xianfeng, Li Bo, Xiang Zhengtao and Tian Li | |
16:50-17:00 | Stock Price Prediction Based on Investor Sentiment Analysis and CNN-LSTM-Attention Model | Maoguang Wang and Jiabei He | |
17:00-17:10 | Code recommendation of embedded network based on intention analysis | Shi Cheng, Zhiqiang Chen1, Xuanyi Zong and Zelin Wang |
Room 1002-2
Time | Content | ||
---|---|---|---|
session 1 | 13:00-13:10 | Sentiment analysis for public opinion based on MapReduce and PSO-SVR | Changfeng Chen, Xuelin Chen, Yangying Zhang and Jianbang Guo |
13:10-13:20 | Personalized Novel Recommendation System Based on Filtering and Sentiment Analysis | Chunwei Shen and Haiming Li | |
13:20-13:30 | Enhancing Relevance and Efficiency in Visual Question Generation through Redundant Object Filtering | Feifei Xu, Yingchen Zhou, Zheng Zhong, Guangzhen Li and Wang Zhou | |
13:30-13:40 | Chinese Named Entity Recognition Algorithm integrating Vocabulary Information | Xiaohua Ke, Binglong Li, Zexian Ou and Xiaobo Wu | |
13:40-13:50 | WSDSum:Unsupervised Extractive Summarization Based | Yukun Cao, Yuanmin Liu, Ming Chen, Jingjing Li and Tianhao Wang | |
13:50-14:00 | IPFS-DKRM: an efficient keyword retrieval model of IPFS based on ART | Jing Li and Jiahao Meng | |
session 2 | 13:00-13:10 | Sentiment analysis for public opinion based on MapReduce and PSO-SVR | Changfeng Chen, Xuelin Chen, Yangying Zhang and Jianbang Guo |
14:00-14:10 | Multi-Modal Variable-Channel Spatial-Temporal Semantic Action Recognition Network | Yao Hu, JiaHong Yang, Yaqin Wang and Liuming Xiao | |
14:10-14:20 | Enhanced and pruned motion planning based on bird's-eye view | Guangyao Si,Chaoxia Shi and Yanqing Wang | |
14:20-14:30 | CCU-NET: CBAM and Cascaded Edge Detection Optimization U-NET for Remote Sensing Image Segmentation | Xiaowen Cao and Jiaji Qin | |
14:30-14:40 | Speech Emotion Recognition Using U-Net | Yongzhen Yu and Daming Liu | |
14:40-14:50 | Non-Invasive Load Decomposition Model Based On Inception-SimAM-BiLSTM | Guixue Cheng and Tianchi Song | |
14:50-15:00 | A Data-driven Coordinated Active And Reactive Dispatching Strategy For Photovoltaics | Ye Xu and Haizhou Du | |
15:00-15:10 | PDTNet: An Image-Based Model for PV Panel Defect Detection | Chen Wang, Mi Wen and Yanbing Bi | |
15:10-15:20 | SAMCNet:A Multi-Channel Face Anti-Spoofing Network Combined with Hyperspectral Images via Self-Attention Mechanism | Chonglei Zhu and Hongjiao Li | |
15:20-15:30 | Image Tampering Detection Method Based on Hybrid Attention Mechanism | Xinqi Yu,Weimin Wei,Renying Pei and Xingchao Zhou | |
15:30-15:40 | Stage-zero A Dynamic Ensemble method for Intrusion Detection in Industrial Control Systems | Zhiming Ma, Lin Zhou, Xiaobo Hu, Chao Li, Siyuan Chen and Yong Wang | |
15:40-15:50 | High-precision Anime Conversion Model based on Generative Adversarial Networks | Jing Li and Xuebin Liang | |
15:50-16:00 | Anomaly Segmentation in Foggy Weather for Autonomous Driving with Adaptive Learnable Filters | Lina Ling, Mi Wen and Zhou Zhu | |
16:00-16:10 | Image tampering localization based on dual-stream feature fusion | Renying Pei, Weimin Wei, Xinqi Yu and Xingchao Zhou | |
16:10-16:20 | Multi-scale Image Tampering Detection Using Inception-UNet Network | Xingchao Zhou, Weimin Wei, Xinqi Yu and Renying Pei | |
16:20-16:30 | Fetal Congenital Heart Disease Diagnosis Based On CBAM-Enhanced ResNet-50 | Chenglong Song,Fang Li,Qiang Chen and Chaolei He | |
16:30-16:40 | Transformers for Single Object Tracking: Temporal Context Propagation and Frame Relationship Modeling | Jiamin Fu, Man Xu and Junyi Li | |
16:40-16:50 | SAFETY HELMET WEARING DETECTION BASED ON YOLOv7 | Yijie Huang, Sangyu Yao and Fangfang Lu | |
16:50-17:00 | A Federated Popularity Prediction Method for Vehicular Named Data Networking | Na Fan, Jialong Li, Yuxin Gao and Junhui Zhang | |
17:00-17:10 | Accelerating Large-Scale GNN by Combining k-Hop Neighbors Based Feature Caching and Hierarchical GPU-Centric Data Access | Wenbin Jiang, Fanxing Pan, Rui Wu, Xinhai Shen, Dongao He and Hai Jin |
Forum
- Edge intelligence and networking frontier technologies research and application 18:00 ~ Dinner9.29 AM
Room 1002-1
Time | Content | ||
---|---|---|---|
session 1 | 09:00-09:10 | Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction | Zihao Fu,Yang Gao and Wanli Lyu |
09:10-09:20 | QR code digital watermarking algorithm based on GWO | Yue Han, Yuanjian Lv and Zhifang Wang | |
09:20-09:30 | Fast CKKS Algorithm in the SEAL Library | Yuanjian Lv, Yue Han and Zhifang Wang | |
09:30-09:40 | A Transformer-based Video Colorization Method Fusing Local Self-Attention and Bidirectional Optical Flow | Lin Yuan, Xun Duan, Lingjie Xiang, Guangqian Kong and Yun Wu | |
09:40-09:50 | An NTRU Lattice-Based Chameleon Hash Scheme for Redactable Blockchain Applications | Zhong Kang, Maoning Wang and Meijiao Duan | |
09:50-10:00 | Traceable Decentralized Policy-Based Chameleon Hash Scheme for Blockchain Rewriting | Haimiao Qin, Meijiao Duan, Yurou Tang and Maoning Wang | |
10:00-10:10 | SECURE IDENTITY AUTHENTICATION PROTOCOL BASED ON BLOCKCHAIN IN SMART HOME | Qianqian Guo, Yong Wang and Siyuan Chen | |
10:10-10:20 | False Data Injection Attack Detection Method Based on Long Time Series Prediction | Chengli Fu, Lin Zhou, Siyuan Chen, Yi Wu and Yong Wang | |
10:20-10:30 | A Hybrid Iris Recognition System Model based on Presentation Attack Detection and Traffic Monitoring Module on AIoT System | Jishun Liu,Liang Shen,Haixia Wu,Bei Lin and Zhipeng Cui | |
session 2 | 10:30-10:40 | An empirical study of the factors influencing the improvement of education quality within higher education institutions | Zhipeng OU, Han Zhang, Yan Yu and Liu Xia |
10:40-10:50 | Study on the Intercultural Competence of Students in Hainan Vocational Colleges | Dan Xian and Yuanhui Li | |
10:50-11:00 | Study on the Communicative Competence of Students of Tourism-related Majors in Hainan Vocational Colleges | Dan Xian and Yuanhui Li | |
11:00-11:10 | Research on the Learning Adaptability and Learning Effectiveness of College Students under the Background of Digital Education | Linlin Tao and Hong Chen | |
11:10-11:20 | Research on the Adaptability of Vocational College Majors and Industry Empirical Study Based on 14 Vocational Colleges in Hainan,China | Yinan Chen, Xia Liu and Lei Chen | |
11:20-11:30 | Practice of the Campus Data Middle Platform Based on Lakehouse Integrated Architecture | Guobao Zhang, Lujian Wan and Conglin Wang |
Room 1002-2
Time | Content | ||
---|---|---|---|
session 1 | 09:00-09:10 | Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction | Zihao Fu,Yang Gao and Wanli Lyu |
09:00-09:10 | Application of Deep Learning Models Based on Chaos Modeling in Power Internet of Things Forecasting Tasks | Jiahao Miao, Yang Long and Zhixin Li | |
09:10-09:20 | Study on compatibility of vegetable insulating oils and mineral insulating oils for transformer based on molecular simulation methods | Xiaojing Mu, Wenliang Wu, Xichao Liu, Gang Wan, Yang, Wang and Weijie Lv | |
09:20-09:30 | Collaborative optimization scheduling model for clean energy in microgrid clusters | Xu chen and Guixue cheng | |
09:30-09:40 | A Distributed Multi-Microgrid Intelligent Scheduling for New Power System | Xiaohan Guo, Haizhou Du and Weina Zhang | |
09:40-09:50 | Development and Application of Intelligent Calculation Analysis Platform For Large Power Grid | Wenchen LI, Yanhao Huang, Xinglei, Chen and Jing Wen | |
09:50-10:00 | A Deep Reinforcement Learning Control Strategy with Integrated Droop Control for Parallel DC-DC Buck Converters with CPLs | Zhongyang Fan, Chenggang Cui, Tianxiao Yang and Chuanlin Zhang | |
10:00-10:10 | MST: A Comprehensive Approach for Short-Term Power Load Forecasting Based on Data Decomposition, Local and Global Modeling | Junyi Sha, Mi Wen, Zhaowu Chu ,Chenyun Liu and HongshanYang | |
session 2 | 10:10-10:20 | An Approach to Identification Model for Electric Event Based on Clustering Analysis | Zecheng Yang, Zhenya Zhang, Ping Wang and Hongmei Chen |
10:20-10:30 | Research on Prediction Models and Optimization Methods for Electrical Current Consumption of Users | Pengpeng Zhang, Zhenya Zhang, Ping Wang and Hongmei Cheng | |
10:30-10:40 | Re-GNN: ANewModelforPredicting Circuit Reliability Degradation | Yu Han and Zhen Wang | |
10:40-10:50 | TRANSFORMER OIL TEMPERATURE PREDICTION METHOD BASED ON CAUSAL DISCOVERY AND GNN-LSTM MODEL | Caiwei Wang and Guixue Cheng | |
10:50-11:00 | The Electronic Power Data Traceability Model Based on Hybrid Consensus and IPFS | Jing Li and Shengyu Tang | |
11:00-11:10 | Research on complementation of new energy spot and medium to long-term transactions based on blockchain | Mengyuan Bao and Daming Liu | |
11:10-11:20 | Knowledge-driven Calculating Method for Transmission Section Limit of Large Power Grid | Xinglei Chen, Jing Wen, Yalou Li, Wenchen Li, Yong Cui and Jun Gu |