-
Article
Predicting movie Box-office revenues by exploiting large-scale social media content
Predicting the box-office revenue of a movie before its theatrical release is an important but challenging problem that requires a high level of Artificial Intelligence. Nowadays, social media has shown its pr...
-
Chapter and Conference Paper
Dorsal Hand Vein Recognition Method Based on Multi-bit Planes Optimization
With the development of technology, how to improve the accuracy of dorsal hand vein recognition has become the focus of current research. In order to solve this problem, this paper proposes a dorsal hand vein ...
-
Chapter and Conference Paper
The Analysis for Binaural Signal’s Characteristics of a Real Source and Corresponding Virtual Sound Image
3D Audio System could rebuild more realistic and immersive sound effects. The existing 3D audio reconstruction methods mainly consider the physical characteristics of sound filed, less take head’s effect on so...
-
Chapter and Conference Paper
A Splicing Interpolation Method for Head-Related Transfer Function
We proposed a new head-related transfer function (HRTF) interpolation method based on splicing. The sound spreads from sound source to listener’s ears, the wave of head-related impulse response (HRIR) clearly ...
-
Chapter and Conference Paper
An Efficient Method Using the Parameterized HRTFs for 3D Audio Real-Time Rendering on Mobile Devices
3D audio real-time rendering is of great importance for virtual reality (VR) application, especially on mobile devices. However, the limited computational power makes it hard to implement fast generation of sp...
-
Chapter and Conference Paper
Speech Intelligibility Enhancement in Strong Mechanical Noise Based on Neural Networks
Speech intelligibility is a significant factor for successful speech communication. To enhance the intelligibility, many methods have been proposed, mainly by operating the speech signal such as increasing the...
-
Chapter and Conference Paper
A Security-Enhanced vTPM 2.0 for Cloud Computing
Virtual Trusted Platform Module is required in cloud due to the scalability and migration of virtual machine. Through allocating a vTPM (Virtual Trusted Platform Module) to a VM (Virtual Machine), users of VM...
-
Article
Weighted motion averaging for the registration of multi-view range scans
Multi-view registration is a fundamental but challenging task in 3D reconstruction and robot vision. Although the original motion averaging algorithm has been introduced as an effective means to solve the mult...
-
Chapter and Conference Paper
Research on the Security of Personal Information in the Era of Big Data
The advent of the era of big data has made people’s lives more intelligent and convenient, and has brought enormous value to human beings. At the same time, it has brought about a lot of challenges. Personal ...
-
Chapter and Conference Paper
Over the Air Test Method for Beidou Intelligent Terminals
The number of Beidou intelligent terminal is dramatically increasing recently. Only during 2017, there have been More than 200 mobile communication terminals supporting BDS applied for telecom equipment access...
-
Chapter and Conference Paper
A Fine-Grained Detection Mechanism for SDN Rule Collision
The rules issued by third-party applications may have direct violations or indirect violations with existing security flow rules in the SDN (software-defined network), thereby leading to the failure of securit...
-
Chapter and Conference Paper
Image Stitching Based on Discrete Wavelet Transform and Slope Fusion
The fusion algorithm of traditional image stitching does not fully consider the differences of the clarity of the two images, and the conventional Discrete Wavelet Transform algorithm would blur the image whe...
-
Chapter and Conference Paper
Philosophical Principles of Data Discovery
Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...
-
Chapter and Conference Paper
PDCS: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing
Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct elements in a da...
-
Chapter and Conference Paper
Adaptive Position and Force Tracking Control in Teleoperation System with Time-Varying Delays
In this work, a novel position and force tracking control scheme are proposed in teleoperation system under time-varying delay and uncertain dynamics. First, two new auxiliary variables are designed for the ma...
-
Article
A near-end listening enhancement system by RNN-based noise cancellation and speech modification
When people listen to the phone in noisy environments, near-end listening enhancement (NELE) is a technology to enhance speech intelligibility against environmental noise. The complex environments in mobile co...
-
Article
Audio object coding based on optimal parameter frequency resolution
Object-based audio content is becoming the main form of audio content, because it is more interactive and flexible than traditional channel-based audio content. The Spatial Audio Object Coding (SAOC) method is...
-
Chapter and Conference Paper
Joint Collaborative Task Offloading for Cost-Efficient Applications in Edge Computing
Edge computing is a new network model providing low-latency service with low bandwidth cost for the users by nearby edge servers. Due to the limited computational capacity of edge servers and devices, some edg...
-
Chapter and Conference Paper
Using GMOSTNet for Tree Detection Under Complex Illumination and Morphological Occlusion
Trees are an integral part of the forestry ecosystem. In forestry work, the precise acquisition of tree morphological parameters and attributes is affected by complex illumination and tree morphology. In order...
-
Chapter and Conference Paper
Resource Allocation Scheme Design in Power Wireless Heterogeneous Networks Considering Load Balance
Recently, in heterogeneous smart grids, mobile network traffic and various power interconnection services grow in a high way. Caching the service at the edge of smart grid network is a common optimization meth...