skip to main content
10.1145/3548636acmotherconferencesBook PagePublication PagesitccConference Proceedingsconference-collections
ITCC '22: Proceedings of the 4th International Conference on Information Technology and Computer Communications
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ITCC 2022: 2022 4th International Conference on Information Technology and Computer Communications Guangzhou China June 23 - 25, 2022
ISBN:
978-1-4503-9682-0
Published:
23 August 2022

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session I - Computer Vision and Image Analysis
research-article
Smart Conveyor Belt Sushi Bill Payment with a Mobile Shot

Organization must automate wherever and whenever they can, particularly during today's global changes in daily lifestyles. Trends regarding the use of technology, especially AI has emerged as a key enabler for disruptive innovation. This paper thus ...

research-article
A Surface Defect Detection method for vacuum gauges based on VAG-YOLO

Vacuum gauges are the key equipment in vacuum inspection equipment, and the surface defects of vacuum gauges will directly affect the inspection performance and service life of vacuum inspection equipment. At present, the surface defect detection of ...

research-article
Improvement in Land Cover Classification Using Multitemporal Sentinel-1 and Sentinel-2 Satellite Imagery

For improving the performance of multitemporal Sentinel-1 (S1) SAR and Sentinel-2 (S2) optical imagery for land cover classification, a framework based on Rotating Kernel Transformation (RKT) denoising algorithm and the stratified sampling method based ...

research-article
Removing or Avoiding the Camera Focus Light Appearing on Glossy or Bouncing Surfaces by Light Guiding and Image Warping

Digital picture or image becomes more and more important in people's daily life, such as for administration, documentation, active communications, and learning processes. People also demand the exchange of information through digital applications and ...

research-article
Quality Changes of Image from Total Variation to Nonlinear Sparsifying Transform for Sparse-view CT Reconstruction

Sparse-view CT has been widely studied as an effective strategy for reducing radiation dose to patients. Total variation (TV) minimization, which is most extensively studied among the existing compressed sensing (CS) techniques, has been recognized as a ...

research-article
Multi-material Reconstruction Method Based On Deep Prior of Spectral Computed Tomography

Spectral computed tomography (Spectral CT) has attracted more and more attention because of its ability of material discrimination. However, as the number of materials increases, it becomes more difficult to decompose the material according to the ...

SESSION: Session II - Text and Semantic Analysis
research-article
Combining Latent Semantic Analysis and Pre-trained Model for Vietnamese Text Readability Assessment: Combining Statistical Semantic Embeddings and Pre-trained Model for Vietnamese Long-Sequence Readability Assessment

Together with the rapid development of text processing, readability assessment is an important and challenging task of measuring how easy or difficult it is to read a text. Despite the foundation and enhancement of this task in high-resource languages ...

research-article
Wav2sv: End-to-end Speaker Embeddings Learning from Raw Waveforms based on Metric Learning for Speaker Verification

With the application of deep learning in the field of speaker recognition, the performance of speaker recognition systems has been greatly improved. However, most current work still relies on handcrafted features, existing raw waveform-based systems ...

research-article
Hybrid approach for text similarity detection in Vietnamese based on Sentence-BERT and WordNet

In this paper, we explore the task of similarity detection, which determines whether two sentences have the same meaning. Although the task has shown to be important in many natural language processing applications, not much work has been done in ...

research-article
EP-BERTGCN: A Simple but Effective Power Equipment Fault Recognition Method

With the advancement of China’s State Grid in recent years, text-based power equipment fault recognition has become an essential tool for power equipment maintenance. The task suffers from the domain gap that exists between the electric power domain ...

research-article
Improve the automatic transliteration from Nôm scripts into Vietnamese National scripts by integrating Sino – Vietnamese knowledge into Statistical Machine Translation

Nôm scripts (chữ Nôm) are Vietnamese ancient scripts that were popularly used in Vietnam from the 10th century to the early 20th century. Nowadays, some automatic transliteration from Nôm scripts (NS) into Vietnamese National scripts (chữ Quốc ngữ - QN) ...

research-article
Lip to Speech Synthesis Based on Speaker Characteristics Feature Fusion

Lip to speech synthesis (Lip2Speech) is a technology that reconstructs speech from the silent talking face video. With the development of deep learning, achievements have been made in this field. Due to the silent talking face video does not contain the ...

SESSION: Session III - Computer and Information Security
research-article
Open Access
An Attack Impact and Host Importance based Approach to Intrusion Response Action Selection

Selecting appropriate actions is crucial for building effective Intrusion Response Systems (IRS) that can counter intrusions according to their priority level. Currently, the priority level of intrusions is determined manually, in a static manner, which ...

research-article
Credit card fraud detection based on self-paced ensemble neural network

Along with the significant increase in the number of credit cards, the number of credit card frauds worldwide is increasing day by day. At the same time, the development of Internet technology has led to the emergence of new fraud methods. The ...

research-article
Two-path Android Malware Detection Based on N-gram Feature Weighting

In recent years, with the full popularity of Android system and applications, the types and number of Android malicious applications also show explosive growth, and more efficient detection technology is urgently needed to identify malicious software. ...

research-article
Multi-label Learning with User Credit Data in China Based on MLKNN

Aiming at the problem of numerous variables in credit data, a large amount of sample data, and inability to intuitively reflect user portraits. This paper uses the MLKNN algorithm to perform multi-label learning on the credit data. According to the ...

research-article
A cooperative opportunistic spectrum access scheme in cognitive cellular networks

In this paper, to decrease the energy consumption, we propose a cooperative opportunistic spectrum access (OSA) scheme in cognitive cellular networks to reduce the number of the spectrum handoff. A three dimension continuous-time Markov chain (CTMC) is ...

research-article
Stock price prediction under multi-frequency model - based on attention state-frequency memory network

Stock price forecasting is the most typical forecasting task in financial time series. However, stock prices are influenced by a variety of factors, with short-term and long-term trading activity being among the most important factors affecting price ...

research-article
Memory Usage Comparison in an Android Application: Basic Object-Oriented Programming vs Decorator Design Pattern: Coding styles for keeping low memory usage in a mobile application.

This paper explores how an Android application consumes memory when it is developed by two approaches: basic object-oriented programming versus decorator design pattern. Somehow programmers develop applications based on their coding experience without ...

research-article
A Simple and Efficient Object-Capability Revocation Method

Revocation is important but difficult in object-capability based systems. As an essential mechanism of capability management, revocation provides the basis for canceling of granted access rights and reclaiming of shared resources. However, efficient ...

Recommendations