Skip to main content

Page of 5
and
  1. No Access

    Chapter and Conference Paper

    Structured and Quantitative Research on Scenario of Firefighting and Rescue Cases

    Structurization and quantization is the key to establish the “scenario-response” reasoning system based on digital scenario matrix of firefighting and rescue cases. Hierarchical index structure based on scenar...

    Lihong Lu, Qingchun Kang, Shaofang Yang, Yu Li in Web-Age Information Management (2014)

  2. No Access

    Chapter and Conference Paper

    Research on Reasoning Model of Firefighting and Rescue Cases

    Based on creating the digital scenario matrix of firefighting cases, this paper proposes four matrix-based drive reasoning models including “type - process” drive, “type - problem” drive, “type - countermeasur...

    Qingchun Kang, Lihong Lu, Libiao Pan, Yu Li, Jian Gao in Web-Age Information Management (2014)

  3. Chapter and Conference Paper

    A Contrast Enhancement Framework with JPEG Artifacts Suppression

    Contrast enhancement is used for many algorithms in computer vision. It is applied either explicitly, such as histogram equalization and tone-curve manipulation, or implicitly via methods that deal with degrad...

    Yu Li, Fangfang Guo, Robby T. Tan, Michael S. Brown in Computer Vision – ECCV 2014 (2014)

  4. No Access

    Chapter and Conference Paper

    Fuzzy Association Rule Mining with Type-2 Membership Functions

    In this paper, a fuzzy association rule mining approach with type-2 membership functions is proposed for dealing with data uncertainty. It first transfers quantitative values in transactions into type-2 fuzzy ...

    Chun-Hao Chen, Tzung-Pei Hong, Yu Li in Intelligent Information and Database Systems (2015)

  5. No Access

    Chapter and Conference Paper

    Feature Fusion of Gradient Direction and LBP for Facial Expression Recognition

    Feature extraction is an important step in facial expression recognition. A novel method is proposed based on feature fusion which combines gradient direction and LBP features. Firstly, eyes are located throug...

    Yu Li, Liang Zhang in Biometric Recognition (2015)

  6. No Access

    Chapter and Conference Paper

    Analysis of Reclaiming Process of Bucket Wheel Stacker-Reclaimer Based on DEM Simulation

    The design of bucket wheel mechanism of bucket wheel stacker-reclaimer mainly refers to the bucket wheel excavator’s design specifications, which is rather conservative. To expand the research of this area, th...

    Gongbo Yang, Yu Li, Dingfang Chen in Human Centered Computing (2015)

  7. No Access

    Chapter and Conference Paper

    Oriented Online Route Recommendation for Spatial Crowdsourcing Task Workers

    Emerging spatial crowdsourcing platforms enable the workers (i.e., crowd) to complete spatial crowdsourcing tasks (like taking photos, conducting citizen journalism) that are associated with rewards and tagged...

    Yu Li, Man Lung Yiu, Wenjian Xu in Advances in Spatial and Temporal Databases (2015)

  8. No Access

    Chapter and Conference Paper

    A Segmented Artificial Bee Colony Algorithm Based on Synchronous Learning Factors

    In this paper, we propose a segmented ABC algorithm based on synchronous learning factors (SABC). For the problem of inferior local search ability and low convergence precision in the artificial bee colony (AB...

    Yu Li, Jianxia Zhang, Dongsheng Zhou in Intelligent Information and Database Syste… (2016)

  9. Chapter and Conference Paper

    Fast Guided Global Interpolation for Depth and Motion

    We study the problems of upsampling a low-resolution depth map and interpolating an initial set of sparse motion matches, with the guidance from a corresponding high-resolution color image. The common objectiv...

    Yu Li, Dongbo Min, Minh N. Do, Jiangbo Lu in Computer Vision – ECCV 2016 (2016)

  10. No Access

    Chapter and Conference Paper

    Predicting Clinical Outcomes of Alzheimer’s Disease from Complex Brain Networks

    Brain network modelling has been shown effective to study the brain connectivity in Alzheimer’s disease (AD). Although the topological features of AD affected brain networks have been widely investigated, com...

    **ngjuan Li, Yu Li, Xue Li in Advanced Data Mining and Applications (2017)

  11. No Access

    Chapter and Conference Paper

    Collaborative Dictionary Learning and Soft Assignment for Sparse Coding of Image Features

    In computer vision, the bag-of-words (BoW) model has been widely applied to image related tasks, such as large scale image retrieval, image classification, and object categorization. The sparse coding (SC) met...

    Jie Liu, Sheng Tang, Yu Li in MultiMedia Modeling (2017)

  12. No Access

    Chapter and Conference Paper

    Fault Diagnosis Method of Diesel Engine Based on Improved Structure Preserving and K-NN Algorithm

    The diesel engine fault data is nonlinear and it’s difficult to extract the characteristic information. Kernel Principal Component Analysis (KPCA) is used to extract features of nonlinear data, only considerin...

    Yu Li, Min Han, Bing Han, **nyi Le in Advances in Neural Networks – ISNN 2018 (2018)

  13. No Access

    Chapter and Conference Paper

    Estimating Interactions of Functional Brain Connectivity by Hidden Markov Models

    The brain activity reflected by functional magnetic resonance imaging (fMRI) is temporally organized as a combination of sensory inputs from environment and its own spontaneous activity. However, temporal patt...

    **ngjuan Li, Yu Li, Jiangtao Cui in Advanced Data Mining and Applications (2018)

  14. No Access

    Chapter and Conference Paper

    Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture

    Unmanned Systems Autonomy Services (UxAS) is a set of networked software modules that collaboratively automate mission-level decision making for unmanned systems. Proposed, developed, and publicized by United ...

    Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang in Network and System Security (2018)

  15. Chapter and Conference Paper

    SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption

    With the rapid development of Cyber-Physical Systems, there has been a growing trend among smart devices to connect networks via different wireless protocols. In particular, smart home devices are becoming mor...

    Yu Li, Yazhe Wang, Yuan Zhang in Information and Communications Security (2018)

  16. No Access

    Chapter and Conference Paper

    A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming

    Video streaming has become an irreplaceable technology in modern smart devices especially with the appearance of dynamic streaming over HTTP (DASH). However, the fluctuating and instability of wireless networ...

    Saba Qasim Jabbar, Dheyaa Jasim Kadhim, Yu Li in Internet and Distributed Computing Systems (2018)

  17. Chapter and Conference Paper

    A New Scheme for QoE Management of Live Video Streaming in Cloud Environment

    Live video streaming process consumes very large data storage and takes very long time, so it requires big data storage and computing infrastructures for implementation. Accordingly, the use of cloud computing...

    Dheyaa Jasim Kadhim, **nguo Yu, Saba Qasim Jabbar, Yu Li in Image and Video Technology (2018)

  18. Chapter and Conference Paper

    Multi-channel Generative Adversarial Network for Parallel Magnetic Resonance Image Reconstruction in K-space

    Magnetic Resonance Imaging (MRI) typically collects data below the Nyquist sampling rate for imaging acceleration. To remove aliasing artifacts, we propose a multi-channel deep generative adversarial network (...

    Pengyue Zhang, Fusheng Wang, Wei Xu, Yu Li in Medical Image Computing and Computer Assis… (2018)

  19. No Access

    Chapter and Conference Paper

    Detecting Suspicious Members in an Online Emotional Support Service

    Online emotional support systems provide free support to individuals who experience stress, anxiety, and depression by bridging individuals (i.e., users) with a crowd of voluntary paraprofessionals. While most...

    Yu Li, Dae Wook Kim, Junjie Zhang in Security and Privacy in Communication Netw… (2018)

  20. No Access

    Chapter and Conference Paper

    L2R-QA: An Open-Domain Question Answering Framework

    Open-domain question answering has always being a challenging task. It involves information retrieval, natural language processing, machine learning, and so on. In this work, we try to explore some comparable ...

    Tieke He, Yu Li, Zhipeng Zou, Qing Wu in Intelligence Science and Big Data Engineer… (2019)

Page of 5