Skip to main content

Page of 1,820
and
  1. No Access

    Chapter and Conference Paper

    Design of a Rotating Inverted Pendulum Control System Based on Qube-Servo2

    In this paper, based on the Qube-Serco2 rotating inverted pendulum system, the mathematical model and state space expression are established, and a stable pendulum control algorithm based on BP neural network ...

    Haoran Wang, Qing Wang, Yujue Wang in Advanced Computational Intelligence and In… (2024)

  2. No Access

    Chapter and Conference Paper

    Trend and Methods of IoT Sequential Data Outlier Detection

    In recent years, the state has made great efforts to develop the transportation industry. With the continuous expansion of the transportation network and the large-scale increase of vehicles, traffic congestio...

    Yinuo Wang, Tao Shen, Siying Qu in Multimedia Technology and Enhanced Learning (2024)

  3. No Access

    Chapter and Conference Paper

    A Refined Hardness Estimation of LWE in Two-Step Mode

    Recently, researchers have proposed many LWE estimators, such as lattice-estimator (Albrecht et al, Asiacrypt 2017) and leaky-LWE-Estimator (Dachman-Soled et al, Crypto 2020), while the latter has already been...

    Wenwen **a, Leizhang Wang, Geng Wang, Dawu Gu in Public-Key Cryptography – PKC 2024 (2024)

  4. No Access

    Chapter

    Introduction

    Data, which refers to transmittable and storable computer information, has been an integral part of modern society ever since the invention of computers. Especially in the past decade, its indispensable role in v...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  5. No Access

    Chapter and Conference Paper

    Approval-Based Participatory Budgeting with Donations

    Participatory budgeting (PB) is a democratic process that allows voters to directly participate in the decision-making process regarding budget spending. The process typically involves presenting voters with a...

    Shiwen Wang, Chenhao Wang, Tian Wang, Weijia Jia in Computing and Combinatorics (2024)

  6. No Access

    Chapter

    Coverage Dynamics: Modeling and Analysis of Data Coverage in Heterogeneous Edge Networks

    Our study in the previous chapter revealed the lifetime of mobile data in large networks, to address the when question. In this chapter, we shift gear to another important aspect of mobile data, that is, the wher...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  7. No Access

    Chapter and Conference Paper

    FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching

    The protection of database watermarking techniques based on primary key (PK) is weakened by potential PK attacks and their huge impact. Using virtual primary key (VPK) schemes is an effective solution to enhan...

    Tiancai Liang, Yun Zhao, Haolin Wang, Ziwen Cai in Intelligent Information Processing XII (2024)

  8. No Access

    Chapter and Conference Paper

    Image Segmentation Algorithm Based on Improved U-Net for Mineral Froth Flotation Process

    The froth size distribution in mineral flotation production is closely tied to production indicators. Therefore, accurate segmentation of froth images is of great significance for optimizing and controlling th...

    Jiansheng Wu, **aoqi Chen, Jianfu Ma, Meixia Fu in Artificial Intelligence in China (2024)

  9. No Access

    Chapter

    Spectrum Dynamics: Modeling, Analysis, and Design of Spectrum Activity Surveillance in DSA-Enabled Systems

    In the previous chapter, we discussed the impact on network resource by data movements in the offloading process, but it is still not clear how to observe such impact. This is especially true for the spectrum res...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  10. No Access

    Chapter and Conference Paper

    Research and Application of Offline Log Analysis Method for E-commerce Based on HHS

    Today, with the rapid development of Internet technology, the storage, analysis and mining of massive data have become an important technical topic in the era of information explosion. The big data technology ...

    Haoliang Wang, Kun Hu, Lili Wang in Intelligence Computation and Applications (2024)

  11. No Access

    Chapter and Conference Paper

    Attribution Guided Layerwise Knowledge Amalgamation from Graph Neural Networks

    Knowledge Amalgamation (KA), aiming to transfer knowledge from multiple well-trained teacher networks to a multi-talented and compact student, is gaining attention due to its crucial role in resource-constrain...

    Yunzhi Hao, Yu Wang, Shunyu Liu, Tongya Zheng, **ngen Wang in Neural Information Processing (2024)

  12. No Access

    Chapter and Conference Paper

    Decoding Policy Directives: An Empirical Study on the Influence of Central Policy Signals on Local Environmental Regulation Behavior

    Central policy texts are crucial instruments utilized by the central government for communicating policy directions, guiding behavior, and administering societal affairs. Analyzing central policy texts helps t...

    Chen Wang, Huijun Wang, Jiabao Pan, ** Li in E-Business. New Challenges and Opportuniti… (2024)

  13. No Access

    Chapter and Conference Paper

    A Modified Two_Arch2 Based on Reference Points for Many-Objective Optimization

    Many-objective optimization problems (MaOPs) refer to those multi-objective problems (MOPs) having more than three objectives. For MaOPs, the performance of most multi-objective evolutionary algorithms (MOEAs)...

    Shuai Wang, Dong **ao, Futao Liao in Intelligence Computation and Applications (2024)

  14. No Access

    Chapter and Conference Paper

    Zero-Shot Medical Information Retrieval via Knowledge Graph Embedding

    In the era of the Internet of Things (IoT), the retrieval of relevant medical information has become essential for efficient clinical decision-making. This paper introduces MedFusionRank, a novel approach to z...

    Yuqi Wang, Zeqiang Wang, Wei Wang, Qi Chen in Internet of Things of Big Data for Healthc… (2024)

  15. No Access

    Chapter and Conference Paper

    FAI: A Fraudulent Account Identification System

    Fraudulent account detection is essential for businesses and online Internet enterprises, which can help to avoid financial loss and improve user experience. However, conventional solutions suffer from two mai...

    Yixin Tian, Yufei Zhang, Fangshu Chen, Bingkun Wang, Jiahui Wang in Artificial Intelligence (2024)

  16. No Access

    Chapter and Conference Paper

    Dual-Stream Context-Aware Neural Network for Survival Prediction from Whole Slide Images

    Whole slide images (WSI) encompass a wealth of information about the tumor micro-environment, which holds prognostic value for patients’ survival. While significant progress has been made in predicting patient...

    Junxiu Gao, Shan **, Ranran Wang, Mingkang Wang in Pattern Recognition and Computer Vision (2024)

  17. No Access

    Chapter and Conference Paper

    Classification Method for Ship-Radiated Noise Based on Joint Feature Extraction

    In order to address the problem of poor recognition performance from single signal features in ship identification and to enhance the accuracy of Convolutional Neural Networks (CNNs) in underwater acoustic tar...

    Libin Du, Mingyang Liu, Zhichao Lv in Intelligent Computers, Algorithms, and App… (2024)

  18. No Access

    Chapter and Conference Paper

    Optimization of Takagi-Sugeno-Kang Fuzzy Model Based on Differential Evolution with Lévy Flight

    In this article, a novel evolutionary algorithm called differential evolution with Lévy flight (DEFL) algorithm was proposed to optimize the Takagi-Sugeno-Kang fuzzy model (TSK fuzzy model) by finding the opti...

    **ao Feng, Yongbin Yu, **gye Cai, Hao Wang in PRICAI 2023: Trends in Artificial Intellig… (2024)

  19. No Access

    Chapter and Conference Paper

    Task Offloading Method for Industrial Internet of Things (IIoT) Targeting Computational Resource Management

    In the context of industrial scenarios, devices exhibit specificity and task arrival rates vary over time. Considering real-world task queuing issues and incorporating edge computing offloading and D2D offload...

    Wenhui Wang, Xuanzhe Wang, Zhenjiang Zhang in Smart Grid and Internet of Things (2024)

  20. No Access

    Chapter and Conference Paper

    Joint Training or Not: An Exploration of Pre-trained Speech Models in Audio-Visual Speaker Diarization

    The scarcity of labeled audio-visual datasets is a constraint for training superior audio-visual speaker diarization systems. To improve the performance of audio-visual speaker diarization, we leverage pre-tra...

    Huan Zhao, Li Zhang, Yue Li, Yannan Wang, Hongji Wang in Man-Machine Speech Communication (2024)

Page of 1,820