skip to main content
10.1145/3523181acmotherconferencesBook PagePublication PagesasseConference Proceedingsconference-collections
ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference Macau Macao February 24 - 26, 2022
ISBN:
978-1-4503-8745-3
Published:
18 April 2022
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Mar 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session I - Advanced Blockchain Theory and Application
research-article
Blockchain Technology as A Guarantee of Transparency in The Supply Chain of Commercial Enterprises

Traceability has become an essential element of supply chain management, especially in safety-sensitive sectors such as food, pharmaceuticals, etc. Upstream (manufacturers, producers, etc.) and downstream (distributors, wholesalers, etc.) supply chain ...

research-article
Trusted blockchain of ring signature in TEE environment

Traditional blockchain system has two problems: poor privacy protection and scalability. The public chain discloses all information, which can be seen by every node. The code of smart contract is clear-text, and the data is also clear-text. Every node ...

research-article
Open Access
Maintain the Persistence of a Distributed Ledger for Future Generations

Blockchain or distributed ledger technology (DLT) guarantees revision safety of transaction logs independent from usage scenarios. Thus, trust is ensured by DLT in a long-term perspective. Hence, one can pose the question, whether DLT is an attractive ...

research-article
The Mechanism of Blockchain Technology Influencing Management Accounting

Blockchain technology is reconstructing and optimizing the management mode and transaction mode of enterprises. As an important part of the management mode and transaction mode of enterprises, management accounting is increasingly being reshaped by ...

research-article
Research on the Application of Blockchain Technology in Education and Teaching in Higher Vocational Colleges

With the progress and development of science and technology, blockchain technology has shown great influence in many fields. Blockchain technology has been widely used in various fields of society, and the integrated development of higher vocational ...

SESSION: Session II - Information Systems and Security
research-article
Image splicing tamper detection based on two-channel dilated convolution

Image splicing tampering detection can provide technical support for the identification of authenticity and integrity of images in various fields by using specific methods to quickly detect whether tampering has occurred in images. Most of the existing ...

research-article
A two-stage spatial pose detection method for bearing rings based on YOLOv5 and binocular vision

The bearing ring has the characteristics of weak texture and high reflection, which easily cause errors in stereo vision matching. To address these issues, this paper proposes a two-stage spatial pose detection method for bearing rings based on YOLOv5 ...

research-article
Secret Message CDMA Multiplexing via QR Codes

In this paper, we propose an innovative secret message multiplexing scheme for QR code based on the technology of Code Division Multiple Access (CDMA). Multiple secret messages distributed for several participants are encoded into a CDMA codeword ...

research-article
Artificial intelligence technology enables the development of management accounting: The generation of Intelligent Accounting

Starting from the concepts of artificial intelligence and management accounting, this paper analyzes the application of artificial intelligence technology in management accounting, expounds the past and present life of intelligent accounting, and ...

research-article
Open Access
Attribute-based encryption with outsourced computation for access control in IoTs

There are many terminal devices with constrained computing resources in the IoT environment. The traditional lightweight attribute-based encryption schemes adopt third-party outsourcing computing to meet the lightweight access control requirements of ...

research-article
The Research on Real-time Security Situation Assessment Technology Based on the Threat Propagation Model

Network security situation assessment is a research hotspot in the field of information security, which is strong in real-time performance. However, most of the current real-time situation assessment technologies are very complicated and do poorly in ...

research-article
Research on Food Safety Data Sharing and Exchange Mechanism

With the development of the economy and the improvement of people's quality of life, the public demand for food taste has gradually changed to the demand for food safety. In order to better facilitate the government to strengthen food safety supervision ...

SESSION: Session III - Computer Science and Computing
research-article
Cluster Analysis for Customer Segmentation with Open Banking Data

Segmenting customers into different groups using their characteristics and behaviors has always been an important topic. Customer segmentation can lead to better customer understanding and targeting, which in turn leads to more effective product ...

research-article
KL Divergence Adaptive Weight Combination Multi-Classifier Emotion Recognition Method Fused with Bimodality

There is the problem that single modal and single classifier emotion recognition rate is not high and robustness is not strong. In this paper, the text and speech easily available dual modalities were combined, and the combined multi-classifier strategy ...

research-article
A Binding Bigraphical Model of Context-Aware Adaptive Systems

Many context-aware adaptive applications (CAAAs) change their behaviors according to the user-configured adaptation rules at runtime, however, some of these rules result in inconsistence with the specifications of the CAAAs unfortunately. By employing ...

research-article
Infusing Biomedical Knowledge into BERT for Chinese Biomedical NLP Tasks with Adversarial Training

Biomedical text mining is becoming increasingly important. Recently, biomedical pre-trained language models such as BioBERT and SciBERT, which can capture biomedical knowledge from text, have achieved promising results in biomedical NLP tasks. However, ...

research-article
The Composable Finance Mosaic Bridge and Liquidity Forecasting

We introduce the forecasting technology behind Composable Finance's (Composable's)1 cross-layer cross-chain bridge Mosaic2 . Mosaic contains a network of vaults, one on each layer and chain, and we present our research into improving the operation and ...

SESSION: Session IV - Business Management and Service Model
research-article
A Combination Model Based Deep Long Term Model for Tourism Demand Forecasting

The accurate tourism demand forecasting is crucial to the development of tourism. However, the challenge of non-linear features recognizing in tourism time series makes it a troublesome thing. To overcome the above difficulties, this paper proposes a ...

research-article
A Multi-Attribute Group Decision Making Method for Express Supplier Selection Based on Generalized Fuzzy Soft Set

At present, the express industry is developing rapidly and a variety of express companies emerge in endlessly. On this basis, the selection of express suppliers is particularly important. In this paper, a multi-attribute group decision making (MAGDM) ...

research-article
TANDOORI: A Passive Customer-Centric and Truly End-to-End Approach using e-KYC and Location-based Positioning for Logistics Services

Logistics chain customers, including senders and recipients, today suffer from being unable to track their delivery status. In fact, the delivery status has never been truly end-to-end; recipients are not aware of when senders will send a parcel to them ...

research-article
A Systematic Approach for Mining Quality of Services: A methodology and a case study

Web services are used to provide different software functionalities to Web service users. Web services can be further classified according to their quality. Mining and visualizing quality attributes could help Web service selectors to find the ...

research-article
The Analysis of Commercial Pattern of Cloud Computing Platform

For solving the problem which there have not suitable commercial pattern of cloud computing platform yet, a commercial pattern of cloud computing platform was proposed and constructed. The solving scheme are provided as follows. After explicitly demand ...

SESSION: Session V - Electronics and Information Technology
research-article
Research on Geometric Brownian motion and its practice in pricing

In this paper, the authors represent two main parts about stochastic process. In the first part, the authors discuss Brownian motion and point out limitation in classic calculus of Brownian motion. In order to solve the limitation, authors introduce Ito ...

research-article
Research on Fault Diagnosis Based on Spiking Neural Networks in Deep Space Environment

Deep space detection technology is one of the development directions in the aerospace field today. The long-distance, high cost, high uncertainty, and severe resource limitations of deep space detection missions determine that deep space detectors need ...

research-article
Implementation of Cloud- And Android-Based Indoor Illuminance  Collection, Transmission and Visualization

Efficient Information Management of Building Light Environment can help create more comfortable and intelligent indoor light environment. This paper aims to develop a Cloud- and Android-based indoor illuminance information system (I3S) framework, ...

research-article
Open Access
GRIN: Make Rewriting More Precise

In computer security, many systems and applications depend on binary rewriting techniques when source code is absent, including binary instrumentation, profiling and security policy reinforcement. While the rewriting technique is continuously evolving, ...

research-article
Research on Integration Scheme of DC Microgrid System and DC Power Supply System for Intelligence Energy Source Station

This paper studies the change of DC power system architecture after the construction of AC / DC microgrid system in 220kV intelligent energy source station, analyzes the possible problems after the integration of DC microgrid system and station DC power ...

research-article
A Task-Parallel and Reconfigurable FPGA-Based Hardware Implementation of Extreme Learning Machine

Extreme learning machine (ELM) is an emerging machine learning algorithm and widely used in various real-world applications due to its extremely fast training speed, good generalization and universal approximation capability. In order to further explore ...

Index Terms

  1. 2022 3rd Asia Service Sciences and Software Engineering Conference
        Index terms have been assigned to the content through auto-classification.

        Recommendations