default search action
APIT 2023: Ho Chi Minh City, Vietnam
- Proceedings of the 2023 5th Asia Pacific Information Technology Conference, APIT 2023, Ho Chi Minh City, Vietnam, February 9-11, 2023. ACM 2023, ISBN 978-1-4503-9950-0
- S. M. Abrar Shahriar, Md. Limon, Mst. Nawshin Tasnim, Ahsan Ullah, Kazi Hassan Robin:
AVCPR; web-based tool for extracting data from clinical pathology records to facilitate additional analysis and dynamic visualization. 1-9 - Arfive Gandhi, Prati Hutari Gani:
Contributing Factors in Electronic Signature Misuse: A Case Study of Software Engineering Students. 10-16 - Hongwei Shen:
Design of PLC Remote Monitoring Software Based on C/S Mode. 17-22 - Shun-Fa Hsu, Yi-In Lee, Ching-Tzu Hsu, Ching-Yin Hsu:
Using No-code Platform to Accelerate Digital Transformation - The Study for Feasibility Analysis and Solution Development of Performance Visualization Cloud-computing Management System (PVCMS). 23-32 - Hongxi Huang, Yuxing Wei, Xiaopeng Yuan, Ruiqi Zheng:
Weighted Matrix Factorization with Wilson Lower Bound Score. 33-37 - Qiuyue Fan:
Design of music data analysis platform based on visualization technology. 38-44 - Guishan Xiang, Yong Liang, Jianhao Ding, Zhijie Lin:
3D Scene Modeling Method based on Sparse Representation. 45-48 - Vaitesswar U. S, Chai Kiat Yeo:
Multi-Range Mixed Graph Convolution Network for Skeleton-Based Action Recognition. 49-54 - Mengru Zhou, Hongbin Yu, Yongpeng Feng:
A Fused FCN and Superpixel Algorithm for Image Semantic Segmentation. 55-61 - Bowen Cui, Bing Zhang, Qiang Zhao:
Underwater Image Enhancement Method Based on Improved Generative Adversarial Network. 62-68 - Zhen Wu, Guo Wang:
A study on the corpus expansion method of neural machine translation based on reverse transcription grammar. 69-75 - He Sun:
Mathematical Modelling Methods Based on Computer Software and Their Applications. 76-81 - Zeyun Li:
Research on Route Recommendation of Tourist Attractions Based on Improved Apriori Algorithm. 82-87 - Yuqi He, Zijie Zhou, Chenyue Qian, Hanqi Ma:
Predicting Score Differences in NBA Regular Season Basketball Games. 88-94 - Wenxi Wang:
An Improved ELM Wireless Sensor Network Intrusion Detection Model Based on an Optimization Algorithm. 95-102 - Adesoji E. Adewale, Tatsuya Yamazaki:
Fundamental Sentiment Analysis by Natural Language Processing and Machine Learning for Email Classification. 103-105 - Zihan Wang:
Food Safety Traceability and Application Based on Blockchain. 106-112 - Ang Swat Lin Lindawati, Bambang Leo Handoko, Mazlina Mustapha, Haryadi Sarjono, Mohamad Heykal:
Metaverse World Challenges for Accountant and Auditor. 113-117 - William Davis, Mahnoor Yaqoob, Luke Bennett, Stefan Mihai, Dang Viet Hung, Ramona Trestian, Mehmet Karamanoglu, Balbir Barn, Huan Xuan Nguyen:
An Innovative Blockchain-Based Traceability Framework for Industry 4.0 Cyber-Physical Factory. 118-122 - Keliang Zhu, Xuemei Shi, Tianzhong Zhang, Huasong Song, Jinlin Xu, Liangfeng Chen:
Intelligent Person Monitoring system of the UHV Power Infrastructure Line Construction site based on Deep Neural Networks. 123-129 - Yiguang Fang, Yichun Wu, Jiehong Xu, Xiaowan Song, Peiwen Qi:
Development on invoicing skills training system of substation switching operation ticket. 130-134 - Qin Yan, Yin Pan:
Analysis of digital technology-based building safety and sustainable development. 135-140 - Quan Yuan, Hao Cheng, Lu Peng, Liang Zhao, Qin Yan, Yinhui Zhang:
Application Practice of Intelligent Steel Bar Centralized Processing Control Based on RMES Cloud Platform-Taking Chongqing East Station Project as an Example. 141-145 - Xiaojiao He:
Automatic Recognition System of Landscape Portrait Photography on Account of AI. 146-151 - Ngoc-Khuong Nguyen, Viet Ha Nguyen, Anh-Cuong Le:
A Local Attention-based Neural Networks for Abstractive Text Summarization. 152-159 - Ahmed Dawod Mohammed Dawod, Lkhagvadorj Munkhdalai, Kwang-Ho Park, Keun Ho Ryu, Van Huy Pham:
NFT Appraisal Using Machine Learning. 160-166 - Zicheng Lin:
A hybrid CNN-LSTM-Attention model for electric energy consumption forecasting. 167-173 - Zhongjin Jiang, Jiawei Liu, Xun Gong, Yue Yin:
An Adversarial Attack Considering Effectiveness and Concealment on Faster R-CNN. 174-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.