We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 101-120 of 6,452 results
  1. Many-objective emergency aided decision making based on knowledge graph

    After emergencies occur, decision-makers can reference historical cases with similar causes to take similar emergency response measures. However,...

    **aoxuan Li, Tianhao Zhao, ... **ngjuan Cai in Applied Intelligence
    Article 13 June 2024
  2. Multiscale dilated convolution and swin-transformer for small sample gearbox fault diagnosis

    Mechanical equipment usually operates in noisy and variable load environments, which presents serious challenges for existing intelligent diagnostic...

    Yazhou Zhang, **aoqiang Zhao, ... Peng Chen in Applied Intelligence
    Article 13 June 2024
  3. The variable precision fuzzy rough set based on overlap and grou** functions with double weight method to MADM

    Variable precision fuzzy rough set (VPFRS) is widely utilized for handling various forms of uncertain information due to its fault-tolerant...

    Zhengqi Shi, Lingqiang Li, ... Jialiang **e in Applied Intelligence
    Article 12 June 2024
  4. ELM: a novel ensemble learning method for multi-target regression and multi-label classification problems

    In this paper, a new Ensemble Learning Method (ELM) is proposed to deal with multi-target regression and multi-label classification problems. In ELM,...

    Yuxuan Wu, Guikai Guo, Huanhuan Gao in Applied Intelligence
    Article 12 June 2024
  5. Multivariate time series anomaly detection via dynamic graph attention network and Informer

    In the industrial Internet, industrial software plays a central role in enhancing the level of intelligent manufacturing. It enables the promotion of...

    **angheng Huang, Ningjiang Chen, ... Suqun Huang in Applied Intelligence
    Article 11 June 2024
  6. Development of an expert-informed rig state classifier using naive bayes algorithm for invisible loss time measurement

    The rig state plays a crucial role in recognizing the operations carried out by the drilling crew and quantifying Invisible Lost Time (ILT). This...

    Mohamed Riad Youcefi, Farouk Said Boukredera, ... Chinedu Pascal Ezenkwu in Applied Intelligence
    Article 11 June 2024
  7. A transfer-learning-based windspeed estimation on the ocean surface: implication for the requirements on the spatial-spectral resolution of remote sensors

    The windspeed on the sea surface is an important factor affecting the process of detecting sea surface targets, as it affects the reflection and...

    Shuang Dong, Ying Li, ... Ming **e in Applied Intelligence
    Article 11 June 2024
  8. Priori separation graph convolution with long-short term temporal modeling for skeleton-based action recognition

    Human action recognition from skeleton motion sequences is widely applied in various fields such as virtual reality, human-computer interaction and...

    Tuo Zang, Jianfeng Tu, ... Lingfeng Liu in Applied Intelligence
    Article 11 June 2024
  9. Deep learning for higher-order nonparametric spatial autoregressive model

    Deep learning technology has been successfully applied in more and more fields. In this paper, the application of deep neural networks in...

    Zitong Li, Yunquan Song, Ling Jian in Applied Intelligence
    Article 10 June 2024
  10. Semantic-alignment transformer and adversary hashing for cross-modal retrieval

    Deep Cross-Modal Hashing (DCMH) has garnered significant attention in the field of cross-modal retrieval due to its advantages such as high...

    Yajun Sun, Meng Wang, Ying Ma in Applied Intelligence
    Article 10 June 2024
  11. TAENet: transencoder-based all-in-one image enhancement with depth awareness

    Recently, CNN-based all-in-one image enhancement methods have been proposed to solve multiple image degradation tasks. However, these CNN-based...

    Wanchuan Fang, Chuansheng Wang, ... Jianzhang Chen in Applied Intelligence
    Article 08 June 2024
  12. A belief interval euclidean distance entropy of the mass function and its application in multi-sensor data fusion

    Dempster-Shafer (D-S) evidence theory has extensive applications in the field of data fusion. It uses the mass function to replace the probability...

    Fuxiao Zhang, Zichong Chen, Rui Cai in Applied Intelligence
    Article 08 June 2024
  13. Two guidance joint network based on coarse map and edge map for camouflaged object detection

    Camouflaged object detection (COD) entails identifying objects in an image that blend with the background. However, most traditional COD methods have...

    Zhe Tang, **g Tang, ... Fang Qi in Applied Intelligence
    Article 08 June 2024
  14. A new uncertainty processing method for trajectory prediction

    In many domains, trajectory prediction a crucial task. Uncertain information, such as complementary and correlated information between multiple...

    Tian Yang, Gang Wang, ... Yang Wang in Applied Intelligence
    Article 07 June 2024
  15. Probabilistic load forecasting based on quantile regression parallel CNN and BiGRU networks

    In the dynamic smart grid landscape, accurate probabilistic forecasting of electric load is critical. This paper presents a novel 24-hour-ahead...

    Yuting Lu, Gaocai Wang, ... Man Wu in Applied Intelligence
    Article 07 June 2024
  16. Progressive image compression for Gaussian mixture model quartile intervals

    In this paper, we proposed a novel deep image coding and decoding model for GMMQI (Gaussian mixture model quartile intervals, GMMQI) and a variable...

    Weiheng Kong, Minghui Sun in Applied Intelligence
    Article 07 June 2024
  17. Multistep traffic speed prediction from multiple time-scale spatiotemporal features using graph attention network

    Traffic forecasting using deep learning represents a crucial aspect of intelligent transportation systems, carrying substantial implications for...

    Jie Fang, Zhichao Wu, ... Hongting Chen in Applied Intelligence
    Article 07 June 2024
  18. SMoTeF: Smurf money laundering detection using temporal order and flow analysis

    Smurfing in financial networks is a popular fraud technique in which fraudsters inject their illegal money into the legitimate financial system. This...

    Shiva Shadrooh, Kjetil Nørvåg in Applied Intelligence
    Article Open access 07 June 2024
  19. CMEFS: chaotic map**-based mayfly optimization with fuzzy entropy for feature selection

    Swarm intelligence algorithms availably settle the issue of feature selection for classification, whereas the Mayfly Optimization Algorithm (MOA)...

    Lin Sun, Hanbo Liang, ... Baofang Chang in Applied Intelligence
    Article 06 June 2024
  20. Improvement of robust tensor principal component analysis based on generalized nonconvex approach

    The problem of nonconvex robust tensor principal component analysis consists of recovering the low-rank and sparse part from a tensor corrupted by...

    Kaiyu Tang, Yali Fan, Yan Song in Applied Intelligence
    Article 05 June 2024
Did you find what you were looking for? Share feedback.