Conference Date | December 23-24, 2022
Time | Content |
---|---|
8:00-9:20 | Admission of Participants |
9:20-9:25 | Opening Ceremony |
Part I: Keynote Session Time: 9:25-10:55 |
Time | Keynote speeches |
---|---|
9:25-9:55 | Title: A Society-Oriented Environment of Machine Learning Speaker: Prof. Witold Pedrycz, University of Alberta, Canada |
9:55-10:25 | Title: Utility-Oriented Techniques, Modeling and Analytics (video) Speaker: Prof. Jerry Chun-Wei Lin, Western Norway University of Applied Sciences, Norway |
10:25-10:55 | Title: Ozone Concentrations Prediction in Lanzhou, China, Using Chaotic Artificial Neural Network Speaker: Dr. Bowen Jia, Sichuan University, China |
Coffee Break Time: 10:55-11:05 | |
Part II: Oral Session Time: 11:05-11:35 |
Time | Presentation |
---|---|
11:05-11:20 | S217 Design of Nucleic Acid Detection System Based on Distributed Control System (video) Canyang Wu, Guiping Lu, Mingzhuo Deng, Dongxun Zhang and Haoyang Zhang |
11:20-11:35 | S121 Study on the Influence Factors of Community Built Environment on Residents' Hypertension (video) Yao Jing, Jingjing Tang, Yu Tai, Yuwei Li, Xinran Wang and Beichen Wang |
Part III: e-Poster Session Time: All Conference Day |
S114 | Detecting COVID-19 Spreading Phases with Time Series Analysis Yuanguo Kuang, Jingyao Zheng and Haiyan Song |
S117 | Confidence-Based Fuzzy Assessment Model of LINK16 Situational Quality Liang Chen, Sule Wang and Lulu Zhao |
S123 | A Multiple Kernel Ensemble Approach for Genomic Prediction Zhihong Wang, Huanchen Wang, Tingxi Yu and Wuping Zhang |
S141 | Important Hyperedge Sorting Method Based on Grounded Laplacian Matrix Mingda Li, Yinghan Wu, Libing Bai and Feng Hu |
S155 | Protocol State Analysis and Annotation Methodology Based on Deep Learning Yuexin Tao, Tianxiang Yu and Yang Xin |
S157 | Reinforcement Learning-Based Detection Method for Malware Behavior in Industrial Control Systems Jiajia Cui, Biao Leng, Xianggen Wang, Fuxi Wanga and Jun Yang |
S158 | Threat Detection Based on Multi-scale Spatiotemporal Feature Fusion of User Behavior Xianggen Wang, Fuxi Wang, Jiajia Cui and Bo Shen |
S160 | Hotspots and Trends of Big Data Research in Chinese Medicine based on Text Mining Yao Yue, Xiaohong Cai and Jiayan Zhu |
S161 | A Signal Feature Extraction Method Based on Hough Transform Luwei Zhang, Jiawei Wang, Lijun Wan and Dongming Li |
S180 | The New Method of Performance Analysis for for A Class of Neutral Systems Housheng Xu and Jichun Wang |
S183 | Highway Traffic Accident Duration Prediction Based on Ensemble Learning and Data Augmentation Jiaona Chen, Daofeng Li, Weijun Tao, Jing Zhang and Peng Wang |
S191 | Research on Path Planning of Automated Guided Vehicle based on Improved RRT * Algorithm Lunhui Xu, Runnan Xu and Xiangyin Yao |
S193 | An Overview of Gesture Recognition Shengwang Wu, Zhongmin Li, Shiji Li, Qiang Liu and Weiyu Wu |
S200 | Part Heuristic K-means Based on Improved Grey Correlation Analysis for Infectious Analysis Bing Li, Qi Liu and Shangying Xu |
S201 | Analysis of Medical Insurance in China by Neural Network Bing Li and Ziye Xiang |
S205 | Privacy Protection Method for Blockchain Transaction Data Based on Homomorphic Encryption and Zero-Knowledge Proof Zhongtu Liu and Chen Liu |
S223 | Cognitive Method of Spatial-Temporal Differentiation Characteristics to Collision Risk Qinghua Zhu, Yongtao Xi, Shenping Hu and Jianjun Wu |
S225 | Event-Triggered Control for Stochastic Singular Systems with State Delay under Dual Cyber Attacks Housheng Xu and Minghao Li |
S226 | Defect Detection of Catenary Cotter Pin based on Three-Level Cascade Architecture and Attention Mechanism Cheng Yue and Yaqi Hu |
S228 | Blind Source Separation Method for Multi-source Ultra-high Frequency Partial Discharge Signals Lijuan Xie and Jiachuan Long |
|