skip to main content
10.1145/3571662acmotherconferencesBook PagePublication PagesiccipConference Proceedingsconference-collections
ICCIP '22: Proceedings of the 8th International Conference on Communication and Information Processing
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCIP 2022: 2022 the 8th International Conference on Communication and Information Processing Beijing China November 3 - 5, 2022
ISBN:
978-1-4503-9710-0
Published:
03 January 2023

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session 1: Computer Model and Intelligent Calculation
research-article
Improved Motion Planning Algorithms Based on Rapidly-exploring Random Tree: A Review

This paper mainly summarizes and introduces the improvements proposed by scholars at home and abroad in recent years for the application of Rapidly-exploring Random Tree in robot arms. This paper first briefly introduces the existing path planning ...

research-article
Multi-modal Variational Auto-Encoder Model for Micro-video Popularity Prediction

Popularity prediction of micro videos on multimedia is a hotly studied topic due to the widespread use of video upload sharing services. It’s also a challenging task because popular pattern is affected by multiple factors and is hard to be modeled. The ...

research-article
Non-Intrusive Load Identification Based on Complex Spectrum and Support Vector Machine

Aiming at the problem that the load identification accuracy of non-intrusive load monitoring (NILM) is greatly affected by the power of loads and the number of background loads, a non-intrusive load identification method based on the current complex ...

research-article
Hybrid Deep Learning CNN-Bidirectional LSTM and Manhattan Distance for Japanese Automated Short Answer Grading: Use case in Japanese Language Studies

This paper discusses the development of an Automatic Essay Grading System (SIMPLE-O) designed using hybrid CNN and Bidirectional LSTM and Manhattan Distance for Japanese language course essay grading. The most stable and best model is trained using ...

research-article
Song popularity prediction model based on multi-modal feature fusion and LightGBM

Since the task of hit song prediction was proposed, many experts and technicians have done a lot of research and achieved good results, but there are still some problems such as limited song feature types, lack of feature importance, and insufficient ...

SESSION: Session 2: Image Analysis and Calculation Method
research-article
Open Access
Distributed Learning based on Asynchronized Discriminator GAN for remote sensing image segmentation

Remote sensing images are usually distributed in different departments and contain private information, so they normally cannot be available publicly. However, it is a trend to jointly use remote sensing images from different departments, because it ...

research-article
Designing Web Based Proctoring System for Online Examination (SPIRIT 1.0) in Telkom University

The digital era, which is a jargon in welcoming the technological developments has given birth to a new form of learning that eliminates the requirement of physical presence of teachers and students within the same place and time, or it can be known as ...

research-article
Open Access
MFFNet: Multi-Receptive Field Fusion Net for Microscope Steel Grain Grading

The grain size is an important steel grading parameter. For metallographic steel images with various grain sizes and complex textures, it is not possible for a human expert to determine the grain size efficiently. Meanwhile, conventional computer ...

research-article
Using Text Mining to Evaluation for Online Shopping Rural Fruits and Vegetables

Online purchasing has become a new front in the conflict between agricultural products with the Internet's rapid expansion. Besides the cost saving because of no physical store, the adoption of Internet marketing is an inevitable trend. The development ...

research-article
Fully Fused Cover Song Identification Model via Feature Fusing and Clustering

In recent years, Cover Song Identification (CSI) based on Siamese Network and music representation learning has achieved good performance, however, there are still many problems such as limited feature fusion, missing decision threshold and single data ...

research-article
AN RDN-based image super-resolution method using Meta-learning

In this paper, we propose a residual dense networks (RDN)-based image super-resolution method using Meta-learning. Specifically, deep extraction of global features is performed on the external dataset through an RDN, meta-learning to obtain an initial ...

research-article
A Survey of Hand Gesture Recognition Based on FMCW Radar

In recent years, with the development of unmanned vehicle fields, the millimeter wave radar has also developed rapidly and has been applied to many systems. Frequency modulated continuous wave (FMCW) radar has become a hot research topic in millimeter ...

research-article
Multi-view 3D Human Physique Dataset Construction For Robust Digital Human Modeling of Natural Scenes

A large number of diverse data sets are necessary for networks to predict human body parameters and reconstruct 3D body models from images. Due to the high cost of motion capture and body scanning, high precision pose and body shape parameters are ...

SESSION: Session 3: Data Management and Information Security
research-article
Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec

In recent years, network security has become the main factor that threatens the development of the Internet. Among the network security threats, advanced persistent threat (APT) is one of the most representative attacks and has brought unprecedented ...

research-article
Privacy Protection Technology in Supply Chain-oriented Blockchain

The supply chain refers to the process that starts from the production of parts, goes through transportation, storage and other processes, and finally forms products and sells them. The supply chain generally consists of suppliers, manufacturers, sales ...

research-article
An encrypted traffic classification method based on contrastive learning

Network traffic classification has become an important part of network management, which is conducive to realizing intelligent network operation and maintenance, improving network quality of service (QoS), and ensuring network security. With the rapid ...

research-article
Construction of Nonlinear Optimal Diffusion Functions over Finite Fields

The diffusion function with large branch number is a fundamental building block in the construction of many block ciphers to achieve provable bounds against differential and linear cryptanalysis. Conventional diffusion functions, which are constructed ...

research-article
Detecting and Punishing Mute Nodes in Shard-Based Permissionless Blockchains

As a key technology to solve the problem of trust in application systems, blockchain has attracted more and more attention in recent years. Many researches focus on applying voting-based consensus in permissionless blockchain to improve the throughput. ...

research-article
Analysis of MOOC's Continuous Learning Intention and Its Influencing Factors of Higher Vocational Students

While MOOC brings a great impact to higher education, there is also the problem of low course completion rate, and it is important to analyze the factors influencing learners' continuous learning and participation in Massive Open Online Course (MOOC) ...

research-article
Post quantum identity authentication mechanism in blockchain

The blockchain technology has developed rapidly in recent years and has been widely used in all walks of life. However, most of the authentication systems adopted by the current blockchain technology are public key infrastructure based on large integer ...

research-article
An Identity-based Group Signature Approach on Decentralized System and Chinese Cryptographic SM2

While reducing costs and improving data security, the new generation of informatics technologies such as blockchain also face problems of operation efficiency and privacy leakage, which have attracted extensive attention from researchers. Digital ...

SESSION: Session 4: Data Communication and Signal Processing
research-article
Spatial spectrum estimation algorithm of polarization sensitive array based on compensating spatial domain manifold matrix

Aiming at the uniform circular array model of conformal antenna array, we proposed a spatial spectrum estimation algorithm of polarization sensitive array based on compensating spatial domain manifold matrix. Because the conformal antenna is highly ...

research-article
Evaluation of Waveform RF Stealth Performance Based on Relative Entropy

RF stealth waveform design is an essential technology in RF stealth radar. LPI performance evaluation of waveforms becomes more and more critical. Several radars transmit waveforms are designed through compound modulation, and the relative entropy ...

research-article
Design of an intelligent substation auxiliary control edge gateway system supporting 5G

Abstract: In order to solve the problems of low intelligence and complex deployment of substation auxiliary control system, a new edge gateway system supporting 5g is designed. The gateway system designs a horizontal and vertical data flow mechanism; AI ...

research-article
Optimization Tracking Algorithm Based on Extended Target Gaussian Mixture PHD Filter

Under low signal-to-noise ratio (SNR) target tracking, poor target information and high clutter limit the tracking effect. Extended targets potentially generate more than one measurement per time step. Multiple extended targets tracking is therefore can ...

research-article
Recognition of Non-cooperative Radio Communication Relationships Based on Transformer

The recognition of communication relationships under Non-cooperative conditions is significant for understanding the network composition of unknown targets, inferring network topology, and identifying key nodes, which is a prerequisite and basis for ...

research-article
The Enhanced Usage Control for data sharing in Industrial Internet

Usage control (UCON) model realizes the usage control of resources by integrating authorization, obligations and conditions and providing characteristics of decision continuity and attribute mutability. In order to better adapt to the data interaction ...

research-article
A 1D-CNN prediction model for stroke classification based on EEG signal

Stroke is an acute cerebrovascular disease with high mortality and disability. Computer-aided interventional diagnosis is a necessary measure to improve the efficiency of stroke diagnosis by using modern advanced medical instruments and machine learning ...

research-article
Traffic Steering in Large-scale Public Cloud

More and more complex services composed of a series of sequentially arranged middleboxes which are mainly used to meet the requirements of advanced services such as security services, auditing services, monitoring services, personalized enterprise ...

research-article
Dynamic resource allocation on Vehicular edge computing and communication

The improvement of modern communication technology has made the Internet of Vehicles (IoV) advance by leaps and bounds, and promotes the progress of many technologies, such as mobile sensing, vehicular edge computing, sensor networks, satellite ...

Recommendations

Acceptance Rates

ICCIP '22 Paper Acceptance Rate61of301submissions,20%Overall Acceptance Rate61of301submissions,20%
YearSubmittedAcceptedRate
ICCIP '223016120%
Overall3016120%