Skip to main content

Page of 5
and
  1. No Access

    Article

    Support top irrelevant machine: learning similarity measures to maximize top precision for image retrieval

    Top precision is one of the most popular performance measures for content-based image retrieval task, while similarity function is the most critical component of a content-based image retrieval system. However...

    Jiandong Meng, Yan Jiang, **aoliang Xu in Neural Computing and Applications (2017)

  2. No Access

    Article

    RETRACTED ARTICLE: Quality assessment for virtual reality technology based on real scene

    Virtual reality technology is a new display technology, which provides users with real viewing experience. As known, most of the virtual reality display through stereoscopic images. However, image quality will...

    Bin Jiang, Jiachen Yang, Na Jiang, Zhihan Lv in Neural Computing and Applications (2018)

  3. No Access

    Article

    Pedestrian detection based on the privileged information

    The pedestrian detection is always a challenging issue in the computer vision. Unlike the object recognition problem, the detection’s speed is a critical factor. In order to accelerate detection speed while ma...

    Fan Meng, Zhiquan Qi, Yingjie Tian, Lingfeng Niu in Neural Computing and Applications (2018)

  4. No Access

    Article

    Research of stacked denoising sparse autoencoder

    Learning results depend on the representation of data, so how to efficiently represent data has been a research hot spot in machine learning and artificial intelligence. With the deepening of the deep learning...

    Lingheng Meng, Shifei Ding, Nan Zhang, Jian Zhang in Neural Computing and Applications (2018)

  5. No Access

    Article

    Generalization improvement for regularized least squares classification

    In the past decades, regularized least squares classification (RLSC) is a commonly used supervised classification method in the machine learning filed because it can be easily resolved through the simple matri...

    Haitao Gan, Qingshan She, Yuliang Ma, Wei Wu in Neural Computing and Applications (2019)

  6. No Access

    Article

    Decision making with multiplicative hesitant fuzzy linguistic preference relations

    This study introduces a new type of preference relations called multiplicative hesitant fuzzy linguistic preference relations (MHFLPRs) to denote the asymmetrically qualitative hesitancy information of decisio...

    Jie Tang, Fanyong Meng in Neural Computing and Applications (2019)

  7. No Access

    Article

    Short-term wind power prediction based on improved small-world neural network

    In a competitive electricity market, wind power prediction is important for market participants. However, the prediction has not a general solution due to its inherent uncertainty, intermittency, and multi-fra...

    Shuang-**n Wang, Meng Li, Long Zhao, Chen ** in Neural Computing and Applications (2019)

  8. No Access

    Article

    Deriving the priority weights from multiplicative consistent single-valued neutrosophic preference relations

    Preference relation is one of the most important and relatively simple approaches to address decision-making problems. As a special case of neutrosophic sets, the single-valued neutrosophic set (SVNS) is an ef...

    Na Wang, Fanyong Meng, Yanwei Xu in Neural Computing and Applications (2019)

  9. No Access

    Article

    Unsupervised learning low-rank tensor from incomplete and grossly corrupted data

    Low-rank tensor completion and recovery have received considerable attention in the recent literature. The existing algorithms, however, are prone to suffer a failure when the multiway data are simultaneously ...

    Zhijun Meng, Yaoming Zhou, Yongjia Zhao in Neural Computing and Applications (2019)

  10. No Access

    Article

    A novel modular RBF neural network based on a brain-like partition method

    In this study, a modular design methodology inherited from cognitive neuroscience and neurophysiology is proposed to develop artificial neural networks, aiming to realize the powerful capability of brain—divid...

    Jun-Fei Qiao, ** Meng, Wen-**g Li in Neural Computing and Applications (2020)

  11. No Access

    Article

    Face image super-resolution with pose via nuclear norm regularized structural orthogonal Procrustes regression

    In real applications, the observed low-resolution face images usually have pose variations. Conventional learning-based methods ignore these variations; thus, the hallucinated high-resolution faces are not rea...

    Guangwei Gao, Dong Zhu, Meng Yang, Huimin Lu in Neural Computing and Applications (2020)

  12. No Access

    Article

    DenseNet with Up-Sampling block for recognizing texts in images

    The Convolutional Recurrent Neural Networks (CRNN) have achieved a great success for the study of OCR. But existing deep models usually apply the down-sampling in pooling operation to reduce the size of featur...

    Zeming Tang, Weiming Jiang, Zhao Zhang, Mingbo Zhao in Neural Computing and Applications (2020)

  13. No Access

    Article

    3D palmprint identification using blocked histogram and improved sparse representation-based classifier

    The three-dimensional (3D) palmprint-based biometrics has been an emerging approach for human recognition. However, it mainly concentrates on one-to-one verification and is not efficient for one-to-many identi...

    Xuefei Bai, Zhaozong Meng, Nan Gao, Zonghua Zhang in Neural Computing and Applications (2020)

  14. No Access

    Article

    Mutual-manifold regularized robust fast latent LRR for subspace recovery and learning

    In this paper, we propose a simple yet effective low-rank representation (LRR) and subspace recovery model called mutual-manifold regularized robust fast latent LRR. Our model improves the representation abili...

    **anzhen Li, Zhao Zhang, Li Zhang, Meng Wang in Neural Computing and Applications (2020)

  15. No Access

    Article

    A machine learning-based scheme for the security analysis of authentication and key agreement protocols

    This paper proposes a novel machine learning-based scheme for the automatic analysis of authentication and key agreement protocols. Considering the traditional formal protocol analysis schemes, their analysis ...

    Zhuo Ma, Yang Liu, Zhuzhu Wang, Haoran Ge, Meng Zhao in Neural Computing and Applications (2020)

  16. No Access

    Article

    Prediction of TBM penetration rate based on Monte Carlo-BP neural network

    Based on the BP neural network model of machine learning method, the corresponding random input parameters are generated by Monte Carlo method, and the prediction of TBM driving speed is studied. In this study...

    Meng Wei, Zelin Wang, **aoyu Wang, Jialuo Peng in Neural Computing and Applications (2021)

  17. No Access

    Article

    Safety diagnosis of TBM for tunnel excavation and its effect on engineering

    Since the development of tunnel construction technology, different tunnel excavation technologies have also been derived for different conditions. The safety diagnosis before the TBM mining method is particula...

    Meng Wei, Yu Song, **aoyu Wang, Jialuo Peng in Neural Computing and Applications (2021)

  18. No Access

    Article

    Bipartite consensus of double-integrator multi-agent systems with nonuniform communication time delays

    In this paper, the bipartite consensus problem is addressed for a class of double-integrator multi-agent systems with antagonistic interactions. The cases with and without communication time delays are conside...

    Wenfeng Hu, Yanhua Yang, Guo Chen, Min Meng in Neural Computing and Applications (2021)

  19. No Access

    Article

    Nonlinear models based on enhanced Kriging interpolation for prediction of rock joint shear strength

    One of the most basic topics in rock mechanic is the shear strength criteria for rock joints. Thus, it is of high importance to accurately predict the shear strength of rock joints. In this study, the abilitie...

    Mahdi Hasanipanah, Debiao Meng, Behrooz Keshtegar in Neural Computing and Applications (2021)

  20. No Access

    Article

    In-depth analysis of financial market based on iris recognition algorithm of MATLAB GUI

    When analyzing financial markets, it needs to mine effective information from massive data. However, it is difficult to obtain information from image information. In order to improve the efficiency of financia...

    Meng Meng, Jiuhong Yu in Neural Computing and Applications (2021)

Page of 5