Skip to main content

Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Exploring High Dimension Large Data Correlation Analysis with Mutual Information and Application

    Applying for information entropy theory, we present a measure of dependence for multi-variables relationships: the high dimensional maximal mutual information coefficient (HMIC). It is a kind of maximal informati...

    Yu-shan Jiang, Dong-Kai Zhang, **ao-min Wang in International Conference on Oriental Think… (2016)

  2. No Access

    Article

    Tomographic PIV investigation on coherent vortex structures over shark-skin-inspired drag-reducing riblets

    Nature has shown us that the microstructure of the skin of fast-swimming sharks in the ocean can reduce the skin friction drag due to the well-known shark-skin effect. In the present study, the effect of shark...

    Shao-Qiong Yang, Shan Li, Hai-** Tian, Qing-Yi Wang, Nan Jiang in Acta Mechanica Sinica (2016)

  3. No Access

    Chapter and Conference Paper

    3D Models to Educated Museum Interactive Exhibition with Computing Techniques

    The use of 3D scanner for the digitalization of 3D objects of cultural heritage is now an established approach. This paper aims at contributing to a better understanding of the emergence of new ideas in exhibi...

    Hao Jiang, **ao-Li Liu, **ang Peng in Software Engineering Trends and Techniques… (2017)

  4. No Access

    Chapter and Conference Paper

    An Improved Virtualization Resource Migration Strategy and Its Application in Data Center

    In order to improve the efficiency of virtualization of data center and to reduce the cost of computation migration, this paper studies all kinds of virtualization solutions and migration strategies to make a...

    WuXue Jiang, YinZhen Zhong, WenLiang Cao in Recent Developments in Intelligent Systems… (2017)

  5. No Access

    Article

    Critical node identification for complex network based on a novel minimum connected dominating set

    Identifying critical nodes in complex networks aims to fragment a graph \(G = (V, E)\) ...

    Fahong Yu, **aoyun **a, Wen** Li, Jiang Tao, Longhua Ma, Zhao-quan Cai in Soft Computing (2017)

  6. No Access

    Article

    Statistical learning based fully homomorphic encryption on encrypted data

    Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand “what the data say”. Privacy of statistical learning, i...

    Linzhi Jiang, Chunxiang Xu, **aofang Wang, Chao Lin in Soft Computing (2017)

  7. No Access

    Chapter and Conference Paper

    The Immune System Model Based on B Method

    Due to the lack of understanding of immunology, the immune theory is still controversial, which causes the difficulty in the immune system simulation. Based on the strict mathematics, the formal B method which...

    Sheng-rong Zou, Si-** Jiang, **ao-min ** in Proceedings of 2017 Chinese Intelligent Sy… (2018)

  8. No Access

    Chapter and Conference Paper

    Research on High-Speed Railway Network Effectiveness Based on Theory of Constraints

    Analytical method of carrying capacity based on Theory of Constraints was put forward. The effectiveness of HRN under the existing high-speed railway transportation organization was analyzed. The results show ...

    Su Liu, Jieying Jiang, Si Ma in Advances in Smart Vehicular Technology, Tr… (2019)

  9. No Access

    Chapter and Conference Paper

    A Novel Approach for Objectness Estimation Based on Saliency Segmentation and Superpixels Clustering

    Object detection is an important and challenging vision task. It is a critical part in many applications such as image search, robot navigation, and scene understanding. In this paper, we propose a novel objec...

    Jie Niu, Yi-Wen Jiang, Liang Huang, Hao-Wen Xue in Genetic and Evolutionary Computing (2019)

  10. No Access

    Chapter and Conference Paper

    The Implementation of NetFlow Log System Using Ceph and ELK Stack

    Each software always has log data. Log data is essential for developers and end-users. With log data, we can indicate the information of system error, warning events or whether our system processes are loading...

    Yuan-Ting Wang, Chao-Tung Yang, Endah Kristiani, Ming-Lun Liu in Frontier Computing (2019)

  11. No Access

    Chapter and Conference Paper

    Evaluating Water Supply Scheme from Urbanization Perspective Based on Weighted TOPSIS

    With the rapid development of urbanization process, water resource has become one of the key factors in restricting urbanization. With this in mind, this paper establishes the calculation model of water supply...

    Lu Gan, Pengyan Jiang, **uyun Chen in Proceedings of the Twelfth International C… (2019)

  12. No Access

    Chapter and Conference Paper

    Formative Assessment System of College English Based on the Big Data

    It is an era of rapid development of network information technology. The informatization becomes one of the most prominent features nowadays. And the field of education has also been considerably influenced. P...

    Jiang-Hui Liu, Wen-**n Liang in Advances in Computational Science and Computing (2019)

  13. No Access

    Chapter and Conference Paper

    Applying Random Forest Method to Analyze Elderly Fitness Training Routine Data

    This study used the random forest algorithm to predict Senior Fitness test results on the execution of Synchronized Monitoring Analysis Record Care (SMARC) programs with the aim of aiding healthcare profession...

    Chia Hsuan Lee, Tien-Lung Sun in Intelligent Human Systems Integration 2019 (2019)

  14. No Access

    Article

    An Adaptive Regularization Approach to Colonoscopic Polyp Detection Using a Cascaded Structure of Encoder–Decoders

    This research aims to segment colonoscopic images by automatically extracting polyp features by exploiting the strengths of convolution neural networks (CNN). The proposed model employs deep learning and adapt...

    Maxwell Hwang, Da Wang, Wei-Cheng Jiang in International Journal of Fuzzy Systems (2019)

  15. No Access

    Chapter and Conference Paper

    The Implementation of a Network Log System Using RNN on Cyberattack Detection with Data Visualization

    Network log data is essential to web administrator, which provides information such as, system error, cyberattack warning, mobile data gigabytes, message sending status, and so on. Managing the massive volume ...

    Chao-Tung Yang, Wei-Je Jiang, Endah Kristiani, Yu-Wei Chan in Frontier Computing (2020)

  16. No Access

    Chapter and Conference Paper

    Location Choice of Overseas Investments in Transportation Infrastructure by Chinese Enterprises: From the Perspective of the “BRICS+” Mode

    The paper discusses the issue of location selection of overseas investment of Chinese enterprises in transportation infrastructure in the “BRICS+” region, and analyzes the influencing factors of such investmen...

    Jiangong Wu, Teng Wang, Hongyan Jiang in Recent Trends in Decision Science and Mana… (2020)

  17. No Access

    Chapter and Conference Paper

    Research on the Influence of Internal Factors on the Quality of Decision-Making of MNCs

    Quality of decision is the key to and premise of the success of international business of multinational enterprises. The correctness, integrity, feasibility, timeliness and efficiency of decision-making consti...

    Jiangong Wu, Hongyan Jiang, Yuting Li in Recent Trends in Decision Science and Management (2020)

  18. No Access

    Article

    A density-core-based clustering algorithm with local resultant force

    Clustering analysis has been widely used in image segmentation, face recognition, protein identification, intrusion detection, document clustering and so on. Most of the previous clustering algorithms are not ...

    **ao-**a Wang, Yu-Fang Zhang, Jiang **e, Qi-Zhu Dai, Zhong-Yang **ong in Soft Computing (2020)

  19. No Access

    Article

    A Fuzzy Segmentation Method to Learn Classification of Mitosis

    Mitotic counts are widely used as a metric for cellular proliferation for prognosis and to determine the aggressiveness of individual cancers. This study presents a less labor-intensive method to count mitotic...

    Maxwell Hwang, Da Wang, Cai Wu, Wei-Cheng Jiang in International Journal of Fuzzy Systems (2020)

  20. No Access

    Chapter and Conference Paper

    Using Spark Distributed Deep Learning to Analyze NetFlow in Data Lake System

    usage of data to improve information security has become the focus of research in the development of big data and artificial intelligence. However, the traditional single database technology is unable...

    Cheng-Tian Jiang, Chao-Tung Yang, Yu-Wei Chan, Endah Kristiani in Frontier Computing (2021)

Page of 4